Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-12351 (GCVE-0-2020-12351)
Vulnerability from cvelistv5
Published
2020-11-23 16:15
Modified
2024-08-04 11:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- escalation of privilege
Summary
Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
References
► | URL | Tags | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:56:51.231Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BlueZ", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access." } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-08T15:06:22", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-12351", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BlueZ", "version": { "version_data": [ { "version_value": "See references" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "escalation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351" }, { "name": "http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-12351", "datePublished": "2020-11-23T16:15:38", "dateReserved": "2020-04-28T00:00:00", "dateUpdated": "2024-08-04T11:56:51.231Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-12351\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2020-11-23T17:15:12.250\",\"lastModified\":\"2024-11-21T04:59:33.433\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.\"},{\"lang\":\"es\",\"value\":\"Una comprobaci\u00f3n de entrada incorrecta en BlueZ puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":5.8,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.5,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.7.7\",\"versionEndExcluding\":\"4.9.240\",\"matchCriteriaId\":\"08773B20-01AF-4061-8951-B595A37CFB4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.202\",\"matchCriteriaId\":\"8E2D7A7E-D935-4817-8AE4-66DED8AA8A2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.152\",\"matchCriteriaId\":\"66F89D5B-1E6E-4A87-A6A1-A4B7C283657A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.72\",\"matchCriteriaId\":\"AA6369D1-CCFF-4758-8837-FA53432ECB57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.8.16\",\"matchCriteriaId\":\"24B20F22-E73D-4739-8952-F751BC0027A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.9.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C150C3-165E-42D6-80D4-87B11340B08C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.9.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"21F51360-AF61-433B-9FD9-D7DE742FABF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.9.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFF43A64-F1B2-49B5-9B1A-3C5287E30CC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.9.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CD5DFA0-15FB-44C2-8C2F-DCABACB998B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.9.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEA3DDD5-5114-44C0-8805-0A0579BB0034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.9.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"573B49F4-C6E1-4032-B46F-70506FE98562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.9.0:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F80706-7471-472D-B9A8-ABDB3C714B4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"162E532B-A9E5-4483-B71E-E2D7EEBE3F33\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
suse-su-2020:3400-1
Vulnerability from csaf_suse
Published
2020-11-19 11:04
Modified
2020-11-19 11:04
Summary
Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP1)
Description of the patch
This update for the Linux Kernel 4.12.14-197_26 fixes several issues.
The following security issues were fixed:
- CVE-2017-1000405: Fixed a bug in the THP CoW support that could have been used by local attackers to corrupt memory of other processes and cause them to crash (bsc#1178264, bsc#1069496, bsc#1070307).
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724, bsc#1177729, bsc#1178397).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
Patchnames
SUSE-2020-3400,SUSE-SLE-Live-Patching-12-SP5-2020-3400,SUSE-SLE-Live-Patching-12-SP5-2020-3401,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3411
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-197_26 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-1000405: Fixed a bug in the THP CoW support that could have been used by local attackers to corrupt memory of other processes and cause them to crash (bsc#1178264, bsc#1069496, bsc#1070307).\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724, bsc#1177729, bsc#1178397).\n- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3400,SUSE-SLE-Live-Patching-12-SP5-2020-3400,SUSE-SLE-Live-Patching-12-SP5-2020-3401,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3411", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3400-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3400-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203400-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3400-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007802.html" }, { "category": "self", "summary": "SUSE Bug 1177513", "url": "https://bugzilla.suse.com/1177513" }, { "category": "self", "summary": "SUSE Bug 1177729", "url": "https://bugzilla.suse.com/1177729" }, { "category": "self", "summary": "SUSE Bug 1178264", "url": "https://bugzilla.suse.com/1178264" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000405 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000405/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" } ], "title": "Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP1)", "tracking": { "current_release_date": "2020-11-19T11:04:09Z", "generator": { "date": "2020-11-19T11:04:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3400-1", "initial_release_date": "2020-11-19T11:04:09Z", "revision_history": [ { "date": "2020-11-19T11:04:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-120-default-8-21.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-120-default-8-21.2.ppc64le", "product_id": "kgraft-patch-4_12_14-120-default-8-21.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_26-default-8-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_26-default-8-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_26-default-8-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-120-default-8-21.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-120-default-8-21.2.x86_64", "product_id": "kgraft-patch-4_12_14-120-default-8-21.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_26-default-8-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_26-default-8-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_26-default-8-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-120-default-8-21.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-120-default-8-21.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-120-default-8-21.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-120-default-8-21.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-120-default-8-21.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-120-default-8-21.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-120-default-8-21.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-120-default-8-21.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_26-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_26-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_26-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_26-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-1000405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000405" } ], "notes": [ { "category": "general", "text": "The Linux Kernel versions 2.6.38 through 4.14 have a problematic use of pmd_mkdirty() in the touch_pmd() function inside the THP implementation. touch_pmd() can be reached by get_user_pages(). In such case, the pmd will become dirty. This scenario breaks the new can_follow_write_pmd()\u0027s logic - pmd can become dirty without going through a COW cycle. This bug is not as severe as the original \"Dirty cow\" because an ext4 file (or any other regular file) cannot be mapped using THP. Nevertheless, it does allow us to overwrite read-only huge pages. For example, the zero huge page and sealed shmem files can be overwritten (since their mapping can be populated using THP). Note that after the first write page-fault to the zero page, it will be replaced with a new fresh (and zeroed) thp.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000405", "url": "https://www.suse.com/security/cve/CVE-2017-1000405" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2017-1000405", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1070307 for CVE-2017-1000405", "url": "https://bugzilla.suse.com/1070307" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-19T11:04:09Z", "details": "important" } ], "title": "CVE-2017-1000405" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-19T11:04:09Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-8-21.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-19T11:04:09Z", "details": "important" } ], "title": "CVE-2020-25645" } ] }
suse-su-2020:2980-1
Vulnerability from csaf_suse
Published
2020-10-21 11:29
Modified
2020-10-21 11:29
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' aka 'BadChoice' (bsc#1177725).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).
The following non-security bugs were fixed:
- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- airo: Fix read overflows sending packets (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- Disable CONFIG_LIVEPATCH_IPA_CLONES where not needed Explicitly disable CONFIG_LIVEPATCH_IPA_CLONES in configs where it is not needed to avoid confusion and unwanted values due to fragment config files.
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- kabi fix for NFS: Fix flexfiles read failover (git-fixes).
- kabi: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kernel-binary.spec.in: Exclude .config.old from kernel-devel - use tar excludes for .kernel-binary.spec.buildenv
- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692). mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692).
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- Move upstreamed intel-vbtn patch into sorted section
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi->cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- NFS: ensure correct writeback errors are returned on close() (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- NFS: Fix security label length not being reset (bsc#1176381).
- NFS: nfs_file_write() should check for writeback errors (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- patches.suse/target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).
- patches.suse/target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch (bsc#1177090).
- patches.suse/target-rbd-support-COMPARE_AND_WRITE.patch: (fate#318836, bsc#1177090).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).
- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- Rename patches to the same name as in SLE15-SP3.
- Rename scsi-fnic-do-not-call-scsi_done-for-unhandled-commands.patch Fix typo in patch file name.
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc->setup() fails (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).
- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).
- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).
- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).
- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xprtrdma: fix incorrect header size calculations (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
Patchnames
SUSE-2020-2980,SUSE-SLE-Module-Basesystem-15-SP2-2020-2980,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2980,SUSE-SLE-Module-Legacy-15-SP2-2020-2980,SUSE-SLE-Module-Live-Patching-15-SP2-2020-2980,SUSE-SLE-Product-HA-15-SP2-2020-2980,SUSE-SLE-Product-WE-15-SP2-2020-2980
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724).\n- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka \u0027BleedingTooth\u0027 aka \u0027BadVibes\u0027 (bsc#1177726).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadChoice\u0027 (bsc#1177725).\n- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).\n- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).\n- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix memory leak in v9fs_mount (git-fixes).\n- ACPI: EC: Reference count query handlers under lock (git-fixes).\n- airo: Fix read overflows sending packets (git-fixes).\n- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).\n- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).\n- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).\n- ASoC: kirkwood: fix IRQ error handling (git-fixes).\n- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).\n- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).\n- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).\n- ath10k: fix array out-of-bounds access (git-fixes).\n- ath10k: fix memory leak for tpc_stats_final (git-fixes).\n- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).\n- Bluetooth: Fix refcount use-after-free issue (git-fixes).\n- Bluetooth: guard against controllers sending zero\u0027d events (git-fixes).\n- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).\n- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).\n- Bluetooth: prefetch channel before killing sock (git-fixes).\n- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).\n- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).\n- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).\n- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).\n- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).\n- btrfs: block-group: refactor how we read one block group item (bsc#1176019).\n- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).\n- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).\n- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).\n- btrfs: do not take an extra root ref at allocation time (bsc#1176019).\n- btrfs: drop logs when we\u0027ve aborted a transaction (bsc#1176019).\n- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).\n- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).\n- btrfs: fix race between page release and a fast fsync (bsc#1177687).\n- btrfs: free block groups after free\u0027ing fs trees (bsc#1176019).\n- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).\n- btrfs: kill the subvol_srcu (bsc#1176019).\n- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).\n- btrfs: make inodes hold a ref on their roots (bsc#1176019).\n- btrfs: make the extent buffer leak check per fs info (bsc#1176019).\n- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).\n- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).\n- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).\n- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).\n- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).\n- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).\n- btrfs: release old extent maps during page release (bsc#1177687).\n- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).\n- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).\n- btrfs: rename member \u0027trimming\u0027 of block group to a more generic name (bsc#1176019).\n- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).\n- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).\n- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).\n- clk: samsung: exynos4: mark \u0027chipid\u0027 clock as CLK_IGNORE_UNUSED (git-fixes).\n- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).\n- clk: tegra: Always program PLL_E when enabled (git-fixes).\n- clk/ti/adpll: allocate room for terminating null (git-fixes).\n- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).\n- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).\n- create Storage / NVMe subsection\n- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).\n- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).\n- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).\n- crypto: ixp4xx - Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).\n- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).\n- crypto: picoxcell - Fix potential race condition bug (git-fixes).\n- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).\n- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).\n- Disable CONFIG_LIVEPATCH_IPA_CLONES where not needed Explicitly disable CONFIG_LIVEPATCH_IPA_CLONES in configs where it is not needed to avoid confusion and unwanted values due to fragment config files.\n- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).\n- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: tegra-apb: Prevent race conditions on channel\u0027s freeing (git-fixes).\n- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).\n- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).\n- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).\n- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).\n- drm/radeon: revert \u0027Prefer lower feedback dividers\u0027 (bsc#1177384).\n- drop Storage / bsc#1171688 subsection No effect on expanded tree.\n- e1000: Do not perform reset in reset_task if we are already down (git-fixes).\n- ftrace: Move RCU is watching check after recursion check (git-fixes).\n- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).\n- gpio: mockup: fix resource leak in error path (git-fixes).\n- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).\n- gpio: siox: explicitly support only threaded irqs (git-fixes).\n- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).\n- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).\n- hwmon: (applesmc) check status earlier (git-fixes).\n- hwmon: (mlxreg-fan) Fix double \u0027Mellanox\u0027 (git-fixes).\n- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).\n- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).\n- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).\n- i2c: cpm: Fix i2c_ram structure (git-fixes).\n- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).\n- i2c: meson: fix clock setting overwrite (git-fixes).\n- i2c: meson: fixup rate calculation with filter delay (git-fixes).\n- i2c: owl: Clear NACK and BUS error bits (git-fixes).\n- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).\n- i2c: tegra: Restore pinmux on system resume (git-fixes).\n- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).\n- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).\n- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).\n- ima: extend boot_aggregate with kernel measurements (bsc#1177617).\n- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).\n- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).\n- iommu/amd: Fix potential @entry null deref (bsc#1177283).\n- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).\n- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).\n- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).\n- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).\n- kabi fix for NFS: Fix flexfiles read failover (git-fixes).\n- kabi: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.\n- kernel-binary.spec.in: Exclude .config.old from kernel-devel - use tar excludes for .kernel-binary.spec.buildenv\n- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.\n- leds: mlxreg: Fix possible buffer overflow (git-fixes).\n- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).\n- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).\n- mac80211: skip mpath lookup also for control port tx (git-fixes).\n- mac802154: tx: fix use-after-free (git-fixes).\n- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).\n- media: camss: Fix a reference count leak (git-fixes).\n- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).\n- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).\n- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).\n- media: omap3isp: Fix memleak in isp_probe (git-fixes).\n- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).\n- media: platform: fcp: Fix a reference count leak (git-fixes).\n- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).\n- media: rcar-vin: Fix a reference count leak (git-fixes).\n- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).\n- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).\n- media: Revert \u0027media: exynos4-is: Add missed check for pinctrl_lookup_state()\u0027 (git-fixes).\n- media: rockchip/rga: Fix a reference count leak (git-fixes).\n- media: s5p-mfc: Fix a reference count leak (git-fixes).\n- media: smiapp: Fix error handling at NVM reading (git-fixes).\n- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).\n- media: stm32-dcmi: Fix a reference count leak (git-fixes).\n- media: tc358743: cleanup tc358743_cec_isr (git-fixes).\n- media: tc358743: initialize variable (git-fixes).\n- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).\n- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).\n- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).\n- media: usbtv: Fix refcounting mixup (git-fixes).\n- media: uvcvideo: Set media controller entity functions (git-fixes).\n- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).\n- media: v4l2-async: Document asd allocation requirements (git-fixes).\n- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).\n- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).\n- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).\n- mmc: core: Rework wp-gpio handling (git-fixes).\n- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).\n- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).\n- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).\n- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).\n- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).\n- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).\n- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).\n- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).\n- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).\n- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).\n- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692). mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692). \n- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).\n- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).\n- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).\n- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).\n- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).\n- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).\n- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).\n- Move upstreamed intel-vbtn patch into sorted section\n- mt76: add missing locking around ampdu action (git-fixes).\n- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).\n- mt76: do not use devm API for led classdev (git-fixes).\n- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).\n- mt76: fix LED link time failure (git-fixes).\n- mtd: cfi_cmdset_0002: do not free cfi-\u003ecfiq in error path of cfi_amdstd_setup() (git-fixes).\n- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).\n- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).\n- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).\n- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).\n- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).\n- NFS: Do not return layout segments that are in use (git-fixes).\n- NFS: ensure correct writeback errors are returned on close() (git-fixes).\n- NFS: Fix flexfiles read failover (git-fixes).\n- NFS: Fix security label length not being reset (bsc#1176381).\n- NFS: nfs_file_write() should check for writeback errors (git-fixes).\n- NFSv4.2: fix client\u0027s attribute cache management for copy_file_range (git-fixes).\n- nvme-multipath: retry commands for dying queues (bsc#1171688).\n- patches.suse/target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).\n- patches.suse/target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch (bsc#1177090).\n- patches.suse/target-rbd-support-COMPARE_AND_WRITE.patch: (fate#318836, bsc#1177090).\n- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).\n- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).\n- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).\n- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).\n- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).\n- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).\n- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).\n- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).\n- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).\n- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).\n- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).\n- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).\n- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).\n- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).\n- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).\n- power: supply: max17040: Correct voltage reading (git-fixes).\n- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).\n- r8169: fix data corruption issue on RTL8402 (bsc#1174098).\n- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).\n- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).\n- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).\n- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).\n- regulator: axp20x: fix LDO2/4 description (git-fixes).\n- regulator: resolve supply after creating regulator (git-fixes).\n- rename Other drivers / Intel IOMMU subsection to IOMMU\n- Rename patches to the same name as in SLE15-SP3.\n- Rename scsi-fnic-do-not-call-scsi_done-for-unhandled-commands.patch Fix typo in patch file name.\n- rtc: ds1374: fix possible race condition (git-fixes).\n- rtc: sa1100: fix possible race condition (git-fixes).\n- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).\n- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove unneeded variable \u0027rval\u0027 (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).\n- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).\n- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).\n- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).\n- serial: uartps: Wait for tx_empty in console setup (git-fixes).\n- spi: dw-pci: free previously allocated IRQs if desc-\u003esetup() fails (git-fixes).\n- spi: fsl-espi: Only process interrupts for expected events (git-fixes).\n- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).\n- spi: sprd: Release DMA channel also on probe deferral (git-fixes).\n- spi: stm32: Rate-limit the \u0027Communication suspended\u0027 message (git-fixes).\n- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).\n- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).\n- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).\n- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).\n- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).\n- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).\n- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).\n- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).\n- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).\n- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).\n- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).\n- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).\n- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).\n- virtio-net: do not disable guest csum when disable LRO (git-fixes).\n- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).\n- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).\n- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).\n- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).\n- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n- yam: fix possible memory leak in yam_init_driver (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2980,SUSE-SLE-Module-Basesystem-15-SP2-2020-2980,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2980,SUSE-SLE-Module-Legacy-15-SP2-2020-2980,SUSE-SLE-Module-Live-Patching-15-SP2-2020-2980,SUSE-SLE-Product-HA-15-SP2-2020-2980,SUSE-SLE-Product-WE-15-SP2-2020-2980", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2980-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2980-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202980-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2980-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1165692", "url": "https://bugzilla.suse.com/1165692" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174098", "url": "https://bugzilla.suse.com/1174098" }, { "category": "self", "summary": "SUSE Bug 1175599", "url": "https://bugzilla.suse.com/1175599" }, { "category": "self", "summary": "SUSE Bug 1175621", "url": "https://bugzilla.suse.com/1175621" }, { "category": "self", "summary": "SUSE Bug 1175807", "url": "https://bugzilla.suse.com/1175807" }, { "category": "self", "summary": "SUSE Bug 1176019", "url": "https://bugzilla.suse.com/1176019" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176979", "url": "https://bugzilla.suse.com/1176979" }, { "category": "self", "summary": "SUSE Bug 1177090", "url": "https://bugzilla.suse.com/1177090" }, { "category": "self", "summary": "SUSE Bug 1177109", "url": "https://bugzilla.suse.com/1177109" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177193", "url": "https://bugzilla.suse.com/1177193" }, { "category": "self", "summary": "SUSE Bug 1177194", "url": "https://bugzilla.suse.com/1177194" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177283", "url": "https://bugzilla.suse.com/1177283" }, { "category": "self", "summary": "SUSE Bug 1177284", "url": "https://bugzilla.suse.com/1177284" }, { "category": "self", "summary": "SUSE Bug 1177285", "url": "https://bugzilla.suse.com/1177285" }, { "category": "self", "summary": "SUSE Bug 1177286", "url": "https://bugzilla.suse.com/1177286" }, { "category": "self", "summary": "SUSE Bug 1177297", "url": "https://bugzilla.suse.com/1177297" }, { "category": "self", "summary": "SUSE Bug 1177384", "url": "https://bugzilla.suse.com/1177384" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177617", "url": "https://bugzilla.suse.com/1177617" }, { "category": "self", "summary": "SUSE Bug 1177681", "url": "https://bugzilla.suse.com/1177681" }, { "category": "self", "summary": "SUSE Bug 1177683", "url": "https://bugzilla.suse.com/1177683" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177694", "url": "https://bugzilla.suse.com/1177694" }, { "category": "self", "summary": "SUSE Bug 1177697", "url": "https://bugzilla.suse.com/1177697" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177726", "url": "https://bugzilla.suse.com/1177726" }, { "category": "self", "summary": "SUSE Bug 954532", "url": "https://bugzilla.suse.com/954532" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-10-21T11:29:08Z", "generator": { "date": "2020-10-21T11:29:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2980-1", "initial_release_date": "2020-10-21T11:29:08Z", "revision_history": [ { "date": "2020-10-21T11:29:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "product": { "name": "cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "product_id": "cluster-md-kmp-default-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-24.29.2.aarch64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-24.29.2.aarch64", "product_id": "cluster-md-kmp-preempt-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.29.2.aarch64", "product": { "name": "dlm-kmp-default-5.3.18-24.29.2.aarch64", "product_id": "dlm-kmp-default-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-24.29.2.aarch64", "product": { "name": "dlm-kmp-preempt-5.3.18-24.29.2.aarch64", "product_id": "dlm-kmp-preempt-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.29.2.aarch64", "product": { "name": "gfs2-kmp-default-5.3.18-24.29.2.aarch64", "product_id": "gfs2-kmp-default-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-24.29.2.aarch64", "product": { "name": "gfs2-kmp-preempt-5.3.18-24.29.2.aarch64", "product_id": "gfs2-kmp-preempt-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-default-5.3.18-24.29.2.aarch64", "product_id": "kernel-default-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "product": { "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "product_id": "kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.aarch64", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.aarch64", "product_id": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-default-devel-5.3.18-24.29.2.aarch64", "product_id": "kernel-default-devel-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-default-extra-5.3.18-24.29.2.aarch64", "product_id": "kernel-default-extra-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-default-livepatch-5.3.18-24.29.2.aarch64", "product_id": "kernel-default-livepatch-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.aarch64", "product_id": "kernel-default-livepatch-devel-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-obs-build-5.3.18-24.29.2.aarch64", "product_id": "kernel-obs-build-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-obs-qa-5.3.18-24.29.2.aarch64", "product_id": "kernel-obs-qa-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-preempt-5.3.18-24.29.2.aarch64", "product_id": "kernel-preempt-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-preempt-devel-5.3.18-24.29.2.aarch64", "product_id": "kernel-preempt-devel-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-preempt-extra-5.3.18-24.29.2.aarch64", "product_id": "kernel-preempt-extra-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-24.29.2.aarch64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-syms-5.3.18-24.29.2.aarch64", "product_id": "kernel-syms-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.29.2.aarch64", "product": { "name": "kselftests-kmp-default-5.3.18-24.29.2.aarch64", "product_id": "kselftests-kmp-default-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-24.29.2.aarch64", "product": { "name": "kselftests-kmp-preempt-5.3.18-24.29.2.aarch64", "product_id": "kselftests-kmp-preempt-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "product": { "name": "ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "product_id": "ocfs2-kmp-default-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-24.29.2.aarch64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-24.29.2.aarch64", "product_id": "ocfs2-kmp-preempt-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "product": { "name": "reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "product_id": "reiserfs-kmp-default-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-24.29.2.aarch64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-24.29.2.aarch64", "product_id": "reiserfs-kmp-preempt-5.3.18-24.29.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-24.29.2.noarch", "product": { "name": "kernel-devel-5.3.18-24.29.2.noarch", "product_id": "kernel-devel-5.3.18-24.29.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-24.29.2.noarch", "product": { "name": "kernel-docs-5.3.18-24.29.2.noarch", "product_id": "kernel-docs-5.3.18-24.29.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-24.29.2.noarch", "product": { "name": "kernel-docs-html-5.3.18-24.29.2.noarch", "product_id": "kernel-docs-html-5.3.18-24.29.2.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-24.29.2.noarch", "product": { "name": "kernel-macros-5.3.18-24.29.2.noarch", "product_id": "kernel-macros-5.3.18-24.29.2.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-24.29.2.noarch", "product": { "name": "kernel-source-5.3.18-24.29.2.noarch", "product_id": "kernel-source-5.3.18-24.29.2.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-24.29.2.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-24.29.2.noarch", "product_id": "kernel-source-vanilla-5.3.18-24.29.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "product": { "name": "cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "product_id": "cluster-md-kmp-default-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.29.2.ppc64le", "product": { "name": "dlm-kmp-default-5.3.18-24.29.2.ppc64le", "product_id": "dlm-kmp-default-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "product": { "name": "gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "product_id": "gfs2-kmp-default-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-debug-5.3.18-24.29.2.ppc64le", "product_id": "kernel-debug-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-debug-devel-5.3.18-24.29.2.ppc64le", "product_id": "kernel-debug-devel-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-24.29.2.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-default-5.3.18-24.29.2.ppc64le", "product_id": "kernel-default-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "product": { "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "product_id": "kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.ppc64le", "product_id": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-default-devel-5.3.18-24.29.2.ppc64le", "product_id": "kernel-default-devel-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-default-extra-5.3.18-24.29.2.ppc64le", "product_id": "kernel-default-extra-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "product_id": "kernel-default-livepatch-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "product_id": "kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-kvmsmall-5.3.18-24.29.2.ppc64le", "product_id": "kernel-kvmsmall-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.3.18-24.29.2.ppc64le", "product_id": "kernel-kvmsmall-devel-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.29.2.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-obs-build-5.3.18-24.29.2.ppc64le", "product_id": "kernel-obs-build-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-obs-qa-5.3.18-24.29.2.ppc64le", "product_id": "kernel-obs-qa-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-syms-5.3.18-24.29.2.ppc64le", "product_id": "kernel-syms-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.29.2.ppc64le", "product": { "name": "kselftests-kmp-default-5.3.18-24.29.2.ppc64le", "product_id": "kselftests-kmp-default-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "product": { "name": "ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "product_id": "ocfs2-kmp-default-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "product": { "name": "reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "product_id": "reiserfs-kmp-default-5.3.18-24.29.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.29.2.s390x", "product": { "name": "cluster-md-kmp-default-5.3.18-24.29.2.s390x", "product_id": "cluster-md-kmp-default-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.29.2.s390x", "product": { "name": "dlm-kmp-default-5.3.18-24.29.2.s390x", "product_id": "dlm-kmp-default-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.29.2.s390x", "product": { "name": "gfs2-kmp-default-5.3.18-24.29.2.s390x", "product_id": "gfs2-kmp-default-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.29.2.s390x", "product": { "name": "kernel-default-5.3.18-24.29.2.s390x", "product_id": "kernel-default-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "product": { "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "product_id": "kernel-default-base-5.3.18-24.29.2.9.9.3.s390x" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.s390x", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.s390x", "product_id": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.29.2.s390x", "product": { "name": "kernel-default-devel-5.3.18-24.29.2.s390x", "product_id": "kernel-default-devel-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.29.2.s390x", "product": { "name": "kernel-default-extra-5.3.18-24.29.2.s390x", "product_id": "kernel-default-extra-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.29.2.s390x", "product": { "name": "kernel-default-livepatch-5.3.18-24.29.2.s390x", "product_id": "kernel-default-livepatch-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "product_id": "kernel-default-livepatch-devel-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "product_id": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.29.2.s390x", "product": { "name": "kernel-obs-build-5.3.18-24.29.2.s390x", "product_id": "kernel-obs-build-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.29.2.s390x", "product": { "name": "kernel-obs-qa-5.3.18-24.29.2.s390x", "product_id": "kernel-obs-qa-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.29.2.s390x", "product": { "name": "kernel-syms-5.3.18-24.29.2.s390x", "product_id": "kernel-syms-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.3.18-24.29.2.s390x", "product": { "name": "kernel-zfcpdump-5.3.18-24.29.2.s390x", "product_id": "kernel-zfcpdump-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.29.2.s390x", "product": { "name": "kselftests-kmp-default-5.3.18-24.29.2.s390x", "product_id": "kselftests-kmp-default-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.29.2.s390x", "product": { "name": "ocfs2-kmp-default-5.3.18-24.29.2.s390x", "product_id": "ocfs2-kmp-default-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.29.2.s390x", "product": { "name": "reiserfs-kmp-default-5.3.18-24.29.2.s390x", "product_id": "reiserfs-kmp-default-5.3.18-24.29.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "product": { "name": "cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "product_id": "cluster-md-kmp-default-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-24.29.2.x86_64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-24.29.2.x86_64", "product_id": "cluster-md-kmp-preempt-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.29.2.x86_64", "product": { "name": "dlm-kmp-default-5.3.18-24.29.2.x86_64", "product_id": "dlm-kmp-default-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-24.29.2.x86_64", "product": { "name": "dlm-kmp-preempt-5.3.18-24.29.2.x86_64", "product_id": "dlm-kmp-preempt-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.29.2.x86_64", "product": { "name": "gfs2-kmp-default-5.3.18-24.29.2.x86_64", "product_id": "gfs2-kmp-default-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-24.29.2.x86_64", "product": { "name": "gfs2-kmp-preempt-5.3.18-24.29.2.x86_64", "product_id": "gfs2-kmp-preempt-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-debug-5.3.18-24.29.2.x86_64", "product_id": "kernel-debug-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-24.29.2.x86_64", "product_id": "kernel-debug-devel-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-24.29.2.x86_64", "product_id": "kernel-debug-livepatch-devel-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-default-5.3.18-24.29.2.x86_64", "product_id": "kernel-default-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "product": { "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "product_id": "kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-default-devel-5.3.18-24.29.2.x86_64", "product_id": "kernel-default-devel-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-default-extra-5.3.18-24.29.2.x86_64", "product_id": "kernel-default-extra-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-default-livepatch-5.3.18-24.29.2.x86_64", "product_id": "kernel-default-livepatch-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "product_id": "kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-24.29.2.x86_64", "product_id": "kernel-kvmsmall-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-24.29.2.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.29.2.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "product_id": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_29-preempt-1-5.3.3.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_29-preempt-1-5.3.3.x86_64", "product_id": "kernel-livepatch-5_3_18-24_29-preempt-1-5.3.3.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-obs-build-5.3.18-24.29.2.x86_64", "product_id": "kernel-obs-build-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-24.29.2.x86_64", "product_id": "kernel-obs-qa-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-preempt-5.3.18-24.29.2.x86_64", "product_id": "kernel-preempt-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-24.29.2.x86_64", "product_id": "kernel-preempt-devel-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-preempt-extra-5.3.18-24.29.2.x86_64", "product_id": "kernel-preempt-extra-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-24.29.2.x86_64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-syms-5.3.18-24.29.2.x86_64", "product_id": "kernel-syms-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.29.2.x86_64", "product": { "name": "kselftests-kmp-default-5.3.18-24.29.2.x86_64", "product_id": "kselftests-kmp-default-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-24.29.2.x86_64", "product": { "name": "kselftests-kmp-preempt-5.3.18-24.29.2.x86_64", "product_id": "kselftests-kmp-preempt-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "product": { "name": "ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "product_id": "ocfs2-kmp-default-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-24.29.2.x86_64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-24.29.2.x86_64", "product_id": "ocfs2-kmp-preempt-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "product": { "name": "reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "product_id": "reiserfs-kmp-default-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-24.29.2.x86_64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-24.29.2.x86_64", "product_id": "reiserfs-kmp-preempt-5.3.18-24.29.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64" }, "product_reference": "kernel-default-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le" }, "product_reference": "kernel-default-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x" }, "product_reference": "kernel-default-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-default-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64" }, "product_reference": "kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x" }, "product_reference": "kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x" }, "product_reference": "kernel-default-devel-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.29.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch" }, "product_reference": "kernel-devel-5.3.18-24.29.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.29.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch" }, "product_reference": "kernel-macros-5.3.18-24.29.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64" }, "product_reference": "kernel-preempt-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.29.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch" }, "product_reference": "kernel-docs-5.3.18-24.29.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x" }, "product_reference": "kernel-obs-build-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.29.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch" }, "product_reference": "kernel-source-5.3.18-24.29.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64" }, "product_reference": "kernel-syms-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le" }, "product_reference": "kernel-syms-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x" }, "product_reference": "kernel-syms-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le" }, "product_reference": "kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x" }, "product_reference": "kernel-default-livepatch-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-default-livepatch-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64" }, "product_reference": "dlm-kmp-default-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le" }, "product_reference": "dlm-kmp-default-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x" }, "product_reference": "dlm-kmp-default-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64" }, "product_reference": "dlm-kmp-default-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64" }, "product_reference": "gfs2-kmp-default-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le" }, "product_reference": "gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x" }, "product_reference": "gfs2-kmp-default-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64" }, "product_reference": "gfs2-kmp-default-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-default-extra-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-21T11:29:08Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-21T11:29:08Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-21T11:29:08Z", "details": "important" } ], "title": "CVE-2020-24490" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-21T11:29:08Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-21T11:29:08Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-21T11:29:08Z", "details": "important" } ], "title": "CVE-2020-25645" } ] }
suse-fu-2022:4496-1
Vulnerability from csaf_suse
Published
2022-12-15 09:43
Modified
2022-12-15 09:43
Summary
Feature update for SCA patterns
Notes
Title of the patch
Feature update for SCA patterns
Description of the patch
This update for SCA patterns fixes the following issues:
sca-patterns-base:
- Version update from 1.3.1 to 1.5.0 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added Core.loadFullFile for sectionless parsing (bsc#1187194)
* Added SUSE.getNetworkInterfaces (bsc#1144162)
* Changed required dependencies from python to python3-base (bsc#1191199)
* Fix SUSE.getFileSystems invalid index error (bsc#1185594)
* Fix SUSE.getFileSystems unbound local SWAP variable (bsc#1185593)
* Removed Novell/OES references from libraries (bsc#1186034)
* Updated documentation for SUSE.compareKernel
* Updated kernel version constants for all SUSE libraries (bsc#1189483)
sca-patterns-hae:
- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added distribution and service pack subdirectories (bsc#1193878)
* False positive hit from /usr/lib/sca/patterns/HAE/stonith-00002.pl (bsc#1124793)
* HAE Policies Quorum 2 node cluster requires ignore policy (bsc#1167689)
* supportconfig indicates IPv6 required by HAE, is already enabled (bsc#1045605)
sca-patterns-suma:
- Version update from 1.0 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
sca-server-report:
- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Changed absolute paths to relative ones (bsc#1186316)
* Changed required dependencies from python to python3-base (bsc#1191199)
* Ensure that the legacy SuSE-release file works (bsc#1196730)
* Fix sca report header supportconfig file (bsc#1186442)
* Fix the report file output path (bsc#1180894)
* Removed preprocessor elements for OES Filr eDir (bsc#1186420)
sca-patterns-sle15:
- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added Video link to coredumpctl-000018634.py
* Added video links to patterns (bsc#1190460):
* bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl
* Fixed crosstalk message strings (bsc#1186312)
* Fixed field reference in sle15all/lvm-00003.pl
* Fixed metadata tags in scc-registered.py
* Fixed percent used calculation for bhc-memused-00001.pl (bsc#1189889)
* Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)
* Requires Core library 1.3.3 which contains Core.logFullFile function
* Updated registration link in bhc-scc-registered.py
* Updated renewal link in bhc-scc-expired.py
- New security announcement patterns:
* Apr 2022 (13) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1
SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1
* Mar 2022 (48) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1
SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1
SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1
SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1
SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1
* Feb 2022 (60) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1
SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1
SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1
SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1
SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1
SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1
SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1
SUSE-SU-2022:0367-1
* Jan 2022 (92) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1
SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1
SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1
SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1
SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1
SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1
SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1
SUSE-SU-2022:0367-1 SUSE-SU-2022:0043-1 SUSE-SU-2022:0177-1 SUSE-SU-2022:0064-1 SUSE-SU-2022:0134-1
SUSE-SU-2022:0141-1 SUSE-SU-2022:0050-1 SUSE-SU-2022:0021-1 SUSE-SU-2022:0069-1 SUSE-SU-2022:0198-1
SUSE-SU-2022:0131-1 SUSE-SU-2022:0088-1 SUSE-SU-2022:0144-1 SUSE-SU-2022:0151-1 SUSE-SU-2022:0091-1
SUSE-SU-2022:0091-1 SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0050-1
SUSE-SU-2022:0137-1 SUSE-SU-2022:0214-1 SUSE-SU-2022:0128-1 SUSE-SU-2022:0119-1 SUSE-SU-2022:0183-1
SUSE-SU-2022:0211-1 SUSE-SU-2022:0251-1 SUSE-SU-2022:0200-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0137-1
SUSE-SU-2022:0214-1 SUSE-SU-2022:0031-1 SUSE-SU-2022:0119-1
* Jul 2021 (20) for SUSE-SU-2021:2457-1 SUSE-SU-2021:2410-1 SUSE-SU-2021:2442-1 SUSE-SU-2021:2352-1
SUSE-SU-2021:1863-2 SUSE-SU-2021:2415-1 SUSE-SU-2021:2555-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2459-1
SUSE-SU-2021:2291-1 SUSE-SU-2021:2457-1 SUSE-SU-2021:2404-1 SUSE-SU-2021:2474-1 SUSE-SU-2021:2471-1
SUSE-SU-2021:2438-1 SUSE-SU-2021:2325-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2461-1 SUSE-SU-2021:2421-1
SUSE-SU-2021:2470-1
* Jun 2021 (46) for SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1998-1 SUSE-SU-2021:2106-1
SUSE-SU-2021:1951-1 SUSE-SU-2021:2213-1 SUSE-SU-2021:1942-1 SUSE-SU-2021:2012-1 SUSE-SU-2021:1859-1
SUSE-SU-2021:1843-1 SUSE-SU-2021:1825-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1
SUSE-SU-2021:2184-1 SUSE-SU-2021:1977-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1944-1 SUSE-SU-2021:1834-1
SUSE-SU-2021:1826-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1999-1
SUSE-SU-2021:2106-1 SUSE-SU-2021:2212-1 SUSE-SU-2021:1893-1 SUSE-SU-2021:1859-1 SUSE-SU-2021:1994-1
SUSE-SU-2021:1970-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1
SUSE-SU-2021:1890-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:1901-1
SUSE-SU-2021:1911-1 SUSE-SU-2021:2104-1 SUSE-SU-2021:1895-1 SUSE-SU-2021:2155-1 SUSE-SU-2021:2122-1
SUSE-SU-2021:2211-1 SUSE-SU-2021:1845-1
* May 2021 (39) for SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1
SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1
SUSE-SU-2021:1755-1 SUSE-SU-2021:1599-1 SUSE-SU-2021:1761-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1
SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1
SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1
SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1 SUSE-SU-2021:1574-1 SUSE-SU-2021:1599-1
SUSE-SU-2021:1761-1 SUSE-SU-2021:1636-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1
SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1500-1 SUSE-SU-2021:1792-1 SUSE-SU-2021:1573-1
* May 2021 (30) for SUSE-SU-2021:1182-1 SUSE-SU-2021:1430-1 SUSE-SU-2021:1168-1 SUSE-SU-2021:1408-1
SUSE-SU-2021:1409-1 SUSE-SU-2021:1182-1 SUSE-SU-2021:1028-1 SUSE-SU-2021:1166-1 SUSE-SU-2021:1430-1
SUSE-SU-2021:1113-1 SUSE-SU-2021:1444-1 SUSE-SU-2021:1280-1 SUSE-SU-2021:1243-1 SUSE-SU-2021:1168-1
SUSE-SU-2021:1408-1 SUSE-SU-2021:1094-1 SUSE-SU-2021:1029-1 SUSE-SU-2021:1238-1 SUSE-SU-2021:1409-1
SUSE-SU-2021:1006-1 SUSE-SU-2021:1161-1 SUSE-SU-2021:1108-1 SUSE-SU-2021:1282-1 SUSE-SU-2021:1179-1
SUSE-SU-2021:1153-1 SUSE-SU-2021:1445-1 SUSE-SU-2021:1244-1 SUSE-SU-2021:1292-1 SUSE-SU-2021:1103-1
SUSE-SU-2021:1455-1
- New regular patterns:
* sle15sp3/oldlvm-000019878.py, sle15sp2/oldlvm-000019878.py: Physical Volume is using an old PV header (bsc#1179170)
* sle15sp3/intelpstate_153-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon
Scalable processors (bsc#1185758)
* sle15sp3/dasdkvm-000020295.py: DASD partitions not recognized on SUSE Linux Enterprise 15 Service Pack 3 KVM guest
* sle15sp2/rpmnfs-000020364.py, sle15sp3/rpmnfs-000020364.py: Upgrading an RPM reports cpio chmod failed
(bsc#1189394)
* sle15sp2/nfstimeout_152-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405)
* sle15sp2/mpiopmem-000019884.py: Executing multipath -ll on Optane memory based pmem devices returns HDIO_GETGEO
failed with 25 (bsc#1182917)
* sle15sp2/ipmitool-000020250.py: hanging on getting cipher suites (bsc#1185684)
* sle15sp2/intelpstate_152-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon Scalable
processors (bsc#1185758)
* sle15sp2/ghostcat_152-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle15sp2/fcoe-000019889.py: System with FCoE connected devices fails to boot randomly due to wicked ordering cycle
problems (bsc#1176140)
* sle15sp1/qlogic-000019630.py: System crashes when the system is rebooted with SR-IOV enabled QLogic cards
(bsc#1155990)
* sle15sp1/passthrough-000019579.py: Passthrough of Raid Controller to KVM guest results in NMI and unresponsiveness
on host (bsc#1152800)
* sle15sp1/nfsperf-151-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)
* sle15sp1/nfsipv6_151-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162)
* sle15sp1/nfit-000019688.py: dmesg shows NFIT related messages after updating the kernel (bsc#1159356)
* sle15sp1/namespace-000019571.py: Activation of multiple namespaces simultaneously may lead to an activation
failure (bsc#1157778)
* sle15sp1/ipmi-000019602.py: IPMI driver can be unloaded when being accessed by user space (bsc#1154768)
* sle15sp1/ghostcat_151-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle15sp1/edac-000019537.py: A kernel message shows EDAC amd64 Error F0 not found, device 0x1460 broken BIOS
(bsc#1131489)
* sle15sp1/docore_151-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1177753)
* sle15sp0/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)
* sle15sp0/ghostcat_150-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle15all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0
* sle15all/vmcore-00002.pl: Detects the need for a kernel core analysis
* sle15all/vmcore-00001.pl: Identifies kernel core dumps for review
* sle15all/udevmac-000020260.py: systemd-udevd Could not generate persistent MAC address for br0 No such file or
directory (bsc#1185357)
* sle15all/systemd-current-failed-7017137.py: Check for failed systemd services
* sle15all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck
* sle15all/softlock-000018705.py: soft lockup messages about
* sle15all/slapd-000019711.py: slapd.service not enabled/failed after upgrade from SUSE Linux Enterprise 11 Service
Pack 4 to SUSE Linux Enterprise 15 (bsc#1156353)
* sle15all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition
* sle15all/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL
server (bsc#1183464)
* sle15all/scc-registered.py: Check system registration status
* sle15all/scc-expired.py: Identify if SCC registrations have expired
* sle15all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1155181)
* sle15all/scatool-000004685.py: scatool fails with traceback
* sle15all/proxy-00003.pl: Checks for proxy environment variables
* sle15all/postfix-000020356.py: Postfix fails to start with IPv6 disabled
* sle15all/oomvsftpd-000020252.py: vsftpd and other processes terminated due to OOM scenario (bsc#1182905)
* sle15all/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux
Enterprise 15 Service Pack 2 (bsc#1176375)
* sle15all/mysqlperf-000020354.py: mysqld segfault when the system is under stress (bsc#1186792)
* sle15all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed (bsc#1179170)
* sle15all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue
* sle15all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata
* sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for
missing physical volumes.
* sle15all/iscsimnts-000019648.py: Proper mount options for iSCSI drives
* sle15all/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508)
* sle15all/coredumpctl-000018634.py: How to obtain systemd service core dumps
* sle15all/btrfsmaster-000018779.py: BTRFS Master TID
* sle15all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled
* sle15all/bhc-scc.sh: Pattern removed (bsc#1184594, bsc#1186317)
* sle15all/acpid-000019708.py: acpid.service failed to start after upgrade (bsc#1158890)
* CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)
+ sle15sp2/crosstalk_152-000019643.py
+ sle15sp1/crosstalk_151-000019643.py
* CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353)
+ sle15sp2/ucodeintel_152-000019635.py
+ sle15sp1/ucodeintel_151-000019635.py
+ sle15sp0/ucodeintel_150-000019635.py
- Renamed pattern files for filename standard
* Renamed patterns/SLE/sle15all/scc-expired.py to patterns/SLE/sle15all/bhc-scc-expired.py
* Renamed /SLE/sle15all/scc-registered.py to patterns/SLE/sle15all/bhc-scc-registered.py
- Updated regular patterns:
* sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for
missing physical volumes
sca-patterns-sle12:
- Version update from 1.0.2 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added Video link to coredumpctl-000018634.py
* Added video links to patterns (bsc#1190460):
+ bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl
* Fixed crosstalk message strings (bsc#1186312)
* Fixed metadata tags for scc-registered.py
* Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)
* Requires Core library 1.3.3 which contains Core.logFullFile function
* Updated registration link in bhc-scc-registered.py
* Updated renewal link in bhc-scc-expired.py
* Updated scc-registered.py pattern to fix registration detection
- New security announcement patterns:
* Apr 2022 (53) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1
SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1
SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1
* Mar 2022 (127) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1
SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1
SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1
SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1
SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1
SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1
SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1
SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1
SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1
SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1
* Feb 2022 (169) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1
SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1
SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1
SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1
SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1
SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1
SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1
SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1
SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1
SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1
SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1
SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1
SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1
SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1
SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1
SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1
* Jan 2022 (218) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1
SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1
SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1
SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1
SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1
SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1
SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1
SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1
SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1
SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1
SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1
SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1
SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1
SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1
SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1
SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1
SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0110-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0060-1
SUSE-SU-2022:0118-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0061-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1
SUSE-SU-2022:0212-1 SUSE-SU-2022:0032-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0080-1 SUSE-SU-2022:0068-1
SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0081-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0160-1
SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1
SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0042-1 SUSE-SU-2022:0034-1
SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1
SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0030-1
SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0041-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1
SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1
* Jun 2021 (80) for SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1929-1 SUSE-SU-2021:1838-1
SUSE-SU-2021:1906-1 SUSE-SU-2021:1880-1 SUSE-SU-2021:1837-1 SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1
SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1
SUSE-SU-2021:2135-1 SUSE-SU-2021:1957-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2016-1 SUSE-SU-2021:1913-1
SUSE-SU-2021:1887-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1959-1 SUSE-SU-2021:1822-1
SUSE-SU-2021:2137-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1
SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1947-1
SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1
SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:1891-1
SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1
SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1 SUSE-SU-2021:2014-1
SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1894-1 SUSE-SU-2021:1842-1
SUSE-SU-2021:2119-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1
SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2060-1 SUSE-SU-2021:2042-1
SUSE-SU-2021:2026-1 SUSE-SU-2021:1870-1 SUSE-SU-2021:1865-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1
SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1
SUSE-SU-2021:2006-1
* May 2021 (39) for SUSE-SU-2021:1580-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1490-1 SUSE-SU-2021:1783-1
SUSE-SU-2021:1782-1 SUSE-SU-2021:1576-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1524-1 SUSE-SU-2021:1766-1
SUSE-SU-2021:1595-1 SUSE-SU-2021:1572-1 SUSE-SU-2021:1760-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1
SUSE-SU-2021:1645-1 SUSE-SU-2021:1763-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1494-1 SUSE-SU-2021:1648-1
SUSE-SU-2021:1492-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1596-1 SUSE-SU-2021:1646-1
SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1786-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1492-1
SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1623-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1
SUSE-SU-2021:1645-1 SUSE-SU-2021:1469-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1617-1 SUSE-SU-2021:1469-1
* Apr 2021 (69) for SUSE-SU-2021:1181-1 SUSE-SU-2021:1023-1 SUSE-SU-2021:1274-1 SUSE-SU-2021:1438-1
SUSE-SU-2021:1242-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1396-1 SUSE-SU-2021:1325-1
SUSE-SU-2021:1152-1 SUSE-SU-2021:1125-1 SUSE-SU-2021:1248-1 SUSE-SU-2021:1210-1 SUSE-SU-2021:1175-1
SUSE-SU-2021:1435-1 SUSE-SU-2021:1314-1 SUSE-SU-2021:1277-1 SUSE-SU-2021:1030-1 SUSE-SU-2021:1165-1
SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1174-1 SUSE-SU-2021:1159-1 SUSE-SU-2021:1315-1
SUSE-SU-2021:1180-1 SUSE-SU-2021:1251-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1241-1 SUSE-SU-2021:1429-1
SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1435-1
SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1
SUSE-SU-2021:1252-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1240-1 SUSE-SU-2021:1401-1
SUSE-SU-2021:1399-1 SUSE-SU-2021:1373-1 SUSE-SU-2021:1341-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1
SUSE-SU-2021:1075-1 SUSE-SU-2021:1074-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1
SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1267-1 SUSE-SU-2021:1442-1
SUSE-SU-2021:1439-1 SUSE-SU-2021:1305-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1
SUSE-SU-2021:1152-1 SUSE-SU-2021:1148-1 SUSE-SU-2021:1145-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1
* Mar 2021 New Security Announcement Patterns (79) for SUSE-SU-2021:0990-1 SUSE-SU-2021:0720-1
SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0975-1 SUSE-SU-2021:0776-1 SUSE-SU-2021:0794-1
SUSE-SU-2021:0886-1 SUSE-SU-2021:0887-1 SUSE-SU-2021:0675-1 SUSE-SU-2021:0987-1 SUSE-SU-2021:0954-1
SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0998-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1
SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0742-1 SUSE-SU-2021:0739-1
SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0713-1 SUSE-SU-2021:0779-1
SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1
SUSE-SU-2020:2173-2 SUSE-SU-2021:0954-1 SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0693-1
SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0736-1
SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1
SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1
SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1
SUSE-SU-2021:0743-1 SUSE-SU-2021:0682-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1
SUSE-SU-2021:0929-1 SUSE-SU-2021:0928-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2
SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0999-1
SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1 SUSE-SU-2021:0744-1 SUSE-SU-2021:0679-1
SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1
- New regular patterns:
* sle12sp5/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)
* sle12sp5/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369)
* sle12sp5/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12sp5/systemd_SUSE-SU-2021_2405-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL
server (bsc#1183464)
* sle12sp5/qemu_SUSE-SU-2021_2448-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5
* sle12sp5/python-py_SUSE-SU-2021_2236-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5
* sle12sp5/permissions_SUSE-SU-2021_2280-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5
* sle12sp5/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from
SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375)
* sle12sp5/nfstimeout_125-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405)
* sle12sp5/nfsperf-125-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)
* sle12sp5/nfsipv6_125-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162)
* sle12sp5/lscpu-000019784-12.py: lscpu segfaults on IBM Power8 - Assertion failed (bsc#1175623)
* sle12sp5/linuxptp_SUSE-SU-2021_2545-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/kgraft-patch_SUSE-SU-2021_2462-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5
* sle12sp5/kgraft-patch_SUSE-SU-2021_2389-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5
* sle12sp5/kgraft-patch_SUSE-SU-2021_2324-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5
* sle12sp5/kernel_SUSE-SU-2021_2416-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/kernel_SUSE-SU-2021_2407-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/kernel_SUSE-SU-2021_2321-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/intelpstate_125-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon
Scalable processors (bsc#1185758)
* sle12sp5/glibc_SUSE-SU-2021_2480-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/ghostcat_125-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp5/docore_125-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194)
* sle12sp5/dbus-1_SUSE-SU-2021_2424-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508)
* sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)
* sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)
* sle12sp4/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)
* sle12sp4/tcpdumpcore-000019666.py: Running tcpdump on a SUSE Linux Enterprise 12 Service Pack 4 System with Kernel
4.12.14-95.48-default may crash the system (bsc#1176579)
* sle12sp4/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369)
* sle12sp4/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12sp4/systemd_SUSE-SU-2021_2423-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL
server (bsc#1183464)
* sle12sp4/plymouth-000019595.py: plymouth hang - login to console not possible
* sle12sp4/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux
Enterprise 15 Service Pack 2 (bsc#1176375)
* sle12sp4/nfsperf-124-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)
* sle12sp4/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)
* sle12sp4/linuxptp_SUSE-SU-2021_2443-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/kgraft-patch_SUSE-SU-2021_2546-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS
* sle12sp4/kgraft-patch_SUSE-SU-2021_2389-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS
* sle12sp4/kernel_SUSE-SU-2021_2422-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/ghostcat_124-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp4/docore_124-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194)
* sle12sp4/curl_SUSE-SU-2021_2425-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508)
* sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)
* sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)
* sle12sp3/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12sp3/systemd_SUSE-SU-2021_2423-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS
* sle12sp3/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)
* sle12sp3/linuxptp_SUSE-SU-2021_2443-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2563-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2538-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2451-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2433-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2389-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/ghostcat_123-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp2/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12sp2/ghostcat_122-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp1/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12sp1/ghostcat_121-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp0/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0
* sle12all/zerologon-000019713.py: Zerologon aka CVE-2020-1472 (bsc#1176579)
* sle12all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck
* sle12all/softlock-000018705.py: soft lockup messages about
* sle12all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition
* sle12all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1186316)
* sle12all/postfix-000020356.py: Postfix fails to start with IPv6 disabled
* sle12all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed
* sle12all/lvm-volume-list-7016683.py: Fixed execution error
* sle12all/iscsimnts-000019648.py: Proper mount options for iSCSI drives
* sle12all/coredumpctl-000018634.py: How to obtain systemd service core dumps
* sle12all/btrfsmaster-000018779.py: BTRFS Master TID
* sle12all/btrfscron-000019583.py: After upgrading BTRFS cron jobs are not working anymore (bsc#1159891)
* sle12all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled
* CVE-2020-12351, CVE-2020-12352, CVE-2020-24490: BleedingTooth
+ sle12sp5/bleedingtooth_125-000019735.py
+ sle12sp4/bleedingtooth_124-000019735.py
+ sle12sp3/bleedingtooth_123-000019735.py
+ sle12sp2/bleedingtooth_122-000019735.py
* CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353)
+ sle12sp5/ucodeintel_125-000019635.py
+ sle12sp4/ucodeintel_124-000019635.py
+ sle12sp3/ucodeintel_123-000019635.py
+ sle12sp2/ucodeintel_122-000019635.py
* CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)
+ sle12sp5/crosstalk_125-000019643.py
+ sle12sp4/crosstalk_124-000019643.py
+ sle12sp3/crosstalk_123-000019643.py
+ sle12sp2/crosstalk_122-000019643.py
- Updated patterns:
* sle12all/scc-expired.py: Identify if SCC registrations have expired
* sle12all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for
missing physical volumes
* sle12all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata
* sle12all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue
- Renamed patterns for file standard:
* Renamed patterns/SLE/sle12all/scc-expired.py to patterns/SLE/sle12all/bhc-scc-expired.py
* Renamed patterns/SLE/sle12all/scc-registered.py to patterns/SLE/sle12all/bhc-scc-registered.py
- Deleted regular patterns (1)
* sle12all/systemd-current-failed-7017137.py: Moved to service packs with fixes (bsc#1187983)
* sle12all/bhc-scc.sh: Pattern removed (bsc#1184594)
* sle12all/pdc-00001.pl: Pattern removed OES Dependent
* sle12all/pdc-00002.pl: Pattern removed OES Dependent
* sle12all/lvm-00001.pl: Pattern removed
* sle12all/lvm-00002.pl: Pattern removed
sca-patterns-sle11:
- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Removed OES dependent patterns (bsc#1196873)
- New security announcement patterns:
* Apr 2022 (5) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1
SUSE-SU-2022:14951-1
* Mar 2022 (19) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1
SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1
SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1
SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1
* Feb 2022 (27) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1
SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1
SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1
SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1
SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1
SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1
* Jan 2022 (34) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1
SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1
SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1
SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1
SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1
SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1 SUSE-SU-2022:14880-1 SUSE-SU-2022:14881-1
SUSE-SU-2022:14872-1 SUSE-SU-2022:14875-1 SUSE-SU-2022:14878-1 SUSE-SU-2022:14882-1 SUSE-SU-2022:14879-1
* Jul 2021 (5) for SUSE-SU-2021:14769-1 SUSE-SU-2021:14771-1 SUSE-SU-2021:14766-1 SUSE-SU-2021:14764-1
SUSE-SU-2021:14761-1
* Jun 2021 (12) for SUSE-SU-2021:14747-1 SUSE-SU-2021:14748-1 SUSE-SU-2021:14744-1 SUSE-SU-2021:14757-1
SUSE-SU-2021:14743-1 SUSE-SU-2021:14758-1 SUSE-SU-2021:14751-1 SUSE-SU-2021:14750-1 SUSE-SU-2021:14740-1
SUSE-SU-2021:14760-1 SUSE-SU-2021:14759-1 SUSE-SU-2021:14749-1
* May 2021 (5) for SUSE-SU-2021:14729-1 SUSE-SU-2021:14724-1 SUSE-SU-2021:14738-1 SUSE-SU-2021:14728-1
SUSE-SU-2021:14714-1
* Apr 2021 (10) for SUSE-SU-2021:14690-1 SUSE-SU-2021:14702-1 SUSE-SU-2021:14705-1 SUSE-SU-2021:14709-1
SUSE-SU-2021:14700-1 SUSE-SU-2021:14708-1 SUSE-SU-2021:14684-1 SUSE-SU-2021:14704-1 SUSE-SU-2021:14712-1
SUSE-SU-2021:14692-1
- New regular patterns:
* sle11sp4/ghostcat_114-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle11sp3/ghostcat_113-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle11all/softlock-000018705.py: soft lockup messages about
* sle11all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition
* sle11all/btrfsmaster-000018779.py: BTRFS Master TID
* CVE-2020-0543: sle11sp4/crosstalk_114-000019643.py: Special Register Buffer Data Sampling aka CrossTalk
(bsc#1154824)
- Deleted regular patterns:
* sle11all/bhc-scc.sh: Pattern removed (bsc#1184594)
Patchnames
SUSE-2022-4496,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4496,openSUSE-SLE-15.3-2022-4496
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Feature update for SCA patterns", "title": "Title of the patch" }, { "category": "description", "text": "This update for SCA patterns fixes the following issues:\n\nsca-patterns-base:\n\n- Version update from 1.3.1 to 1.5.0 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Added Core.loadFullFile for sectionless parsing (bsc#1187194)\n * Added SUSE.getNetworkInterfaces (bsc#1144162)\n * Changed required dependencies from python to python3-base (bsc#1191199)\n * Fix SUSE.getFileSystems invalid index error (bsc#1185594)\n * Fix SUSE.getFileSystems unbound local SWAP variable (bsc#1185593)\n * Removed Novell/OES references from libraries (bsc#1186034)\n * Updated documentation for SUSE.compareKernel\n * Updated kernel version constants for all SUSE libraries (bsc#1189483)\n\nsca-patterns-hae:\n\n- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Added distribution and service pack subdirectories (bsc#1193878)\n * False positive hit from /usr/lib/sca/patterns/HAE/stonith-00002.pl (bsc#1124793)\n * HAE Policies Quorum 2 node cluster requires ignore policy (bsc#1167689)\n * supportconfig indicates IPv6 required by HAE, is already enabled (bsc#1045605)\n\nsca-patterns-suma:\n\n- Version update from 1.0 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n\nsca-server-report:\n\n- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Changed absolute paths to relative ones (bsc#1186316)\n * Changed required dependencies from python to python3-base (bsc#1191199)\n * Ensure that the legacy SuSE-release file works (bsc#1196730) \n * Fix sca report header supportconfig file (bsc#1186442)\n * Fix the report file output path (bsc#1180894)\n * Removed preprocessor elements for OES Filr eDir (bsc#1186420)\n\nsca-patterns-sle15:\n\n- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Added Video link to coredumpctl-000018634.py\n * Added video links to patterns (bsc#1190460):\n * bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl\n * Fixed crosstalk message strings (bsc#1186312)\n * Fixed field reference in sle15all/lvm-00003.pl\n * Fixed metadata tags in scc-registered.py\n * Fixed percent used calculation for bhc-memused-00001.pl (bsc#1189889)\n * Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)\n * Requires Core library 1.3.3 which contains Core.logFullFile function\n * Updated registration link in bhc-scc-registered.py\n * Updated renewal link in bhc-scc-expired.py\n- New security announcement patterns:\n * Apr 2022 (13) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1\n SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1\n SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1\n * Mar 2022 (48) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1\n SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1\n SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1\n SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1\n SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1\n SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1\n * Feb 2022 (60) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1\n SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1\n SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1\n SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1\n SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1\n SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1\n SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1\n SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1\n SUSE-SU-2022:0367-1\n * Jan 2022 (92) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1\n SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1\n SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1\n SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1\n SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1\n SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1\n SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1\n SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1\n SUSE-SU-2022:0367-1 SUSE-SU-2022:0043-1 SUSE-SU-2022:0177-1 SUSE-SU-2022:0064-1 SUSE-SU-2022:0134-1\n SUSE-SU-2022:0141-1 SUSE-SU-2022:0050-1 SUSE-SU-2022:0021-1 SUSE-SU-2022:0069-1 SUSE-SU-2022:0198-1\n SUSE-SU-2022:0131-1 SUSE-SU-2022:0088-1 SUSE-SU-2022:0144-1 SUSE-SU-2022:0151-1 SUSE-SU-2022:0091-1\n SUSE-SU-2022:0091-1 SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0050-1\n SUSE-SU-2022:0137-1 SUSE-SU-2022:0214-1 SUSE-SU-2022:0128-1 SUSE-SU-2022:0119-1 SUSE-SU-2022:0183-1\n SUSE-SU-2022:0211-1 SUSE-SU-2022:0251-1 SUSE-SU-2022:0200-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0137-1\n SUSE-SU-2022:0214-1 SUSE-SU-2022:0031-1 SUSE-SU-2022:0119-1\n * Jul 2021 (20) for SUSE-SU-2021:2457-1 SUSE-SU-2021:2410-1 SUSE-SU-2021:2442-1 SUSE-SU-2021:2352-1\n SUSE-SU-2021:1863-2 SUSE-SU-2021:2415-1 SUSE-SU-2021:2555-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2459-1\n SUSE-SU-2021:2291-1 SUSE-SU-2021:2457-1 SUSE-SU-2021:2404-1 SUSE-SU-2021:2474-1 SUSE-SU-2021:2471-1\n SUSE-SU-2021:2438-1 SUSE-SU-2021:2325-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2461-1 SUSE-SU-2021:2421-1\n SUSE-SU-2021:2470-1\n * Jun 2021 (46) for SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1998-1 SUSE-SU-2021:2106-1\n SUSE-SU-2021:1951-1 SUSE-SU-2021:2213-1 SUSE-SU-2021:1942-1 SUSE-SU-2021:2012-1 SUSE-SU-2021:1859-1\n SUSE-SU-2021:1843-1 SUSE-SU-2021:1825-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1\n SUSE-SU-2021:2184-1 SUSE-SU-2021:1977-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1944-1 SUSE-SU-2021:1834-1\n SUSE-SU-2021:1826-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1999-1\n SUSE-SU-2021:2106-1 SUSE-SU-2021:2212-1 SUSE-SU-2021:1893-1 SUSE-SU-2021:1859-1 SUSE-SU-2021:1994-1\n SUSE-SU-2021:1970-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1\n SUSE-SU-2021:1890-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:1901-1\n SUSE-SU-2021:1911-1 SUSE-SU-2021:2104-1 SUSE-SU-2021:1895-1 SUSE-SU-2021:2155-1 SUSE-SU-2021:2122-1\n SUSE-SU-2021:2211-1 SUSE-SU-2021:1845-1\n * May 2021 (39) for SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1\n SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 \n SUSE-SU-2021:1755-1 SUSE-SU-2021:1599-1 SUSE-SU-2021:1761-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 \n SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 \n SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 \n SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1 SUSE-SU-2021:1574-1 SUSE-SU-2021:1599-1 \n SUSE-SU-2021:1761-1 SUSE-SU-2021:1636-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1 \n SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1500-1 SUSE-SU-2021:1792-1 SUSE-SU-2021:1573-1\n * May 2021 (30) for SUSE-SU-2021:1182-1 SUSE-SU-2021:1430-1 SUSE-SU-2021:1168-1 SUSE-SU-2021:1408-1 \n SUSE-SU-2021:1409-1 SUSE-SU-2021:1182-1 SUSE-SU-2021:1028-1 SUSE-SU-2021:1166-1 SUSE-SU-2021:1430-1\n SUSE-SU-2021:1113-1 SUSE-SU-2021:1444-1 SUSE-SU-2021:1280-1 SUSE-SU-2021:1243-1 SUSE-SU-2021:1168-1\n SUSE-SU-2021:1408-1 SUSE-SU-2021:1094-1 SUSE-SU-2021:1029-1 SUSE-SU-2021:1238-1 SUSE-SU-2021:1409-1\n SUSE-SU-2021:1006-1 SUSE-SU-2021:1161-1 SUSE-SU-2021:1108-1 SUSE-SU-2021:1282-1 SUSE-SU-2021:1179-1\n SUSE-SU-2021:1153-1 SUSE-SU-2021:1445-1 SUSE-SU-2021:1244-1 SUSE-SU-2021:1292-1 SUSE-SU-2021:1103-1\n SUSE-SU-2021:1455-1\n- New regular patterns:\n * sle15sp3/oldlvm-000019878.py, sle15sp2/oldlvm-000019878.py: Physical Volume is using an old PV header (bsc#1179170)\n * sle15sp3/intelpstate_153-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon\n Scalable processors (bsc#1185758)\n * sle15sp3/dasdkvm-000020295.py: DASD partitions not recognized on SUSE Linux Enterprise 15 Service Pack 3 KVM guest\n * sle15sp2/rpmnfs-000020364.py, sle15sp3/rpmnfs-000020364.py: Upgrading an RPM reports cpio chmod failed\n (bsc#1189394)\n * sle15sp2/nfstimeout_152-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405)\n * sle15sp2/mpiopmem-000019884.py: Executing multipath -ll on Optane memory based pmem devices returns HDIO_GETGEO\n failed with 25 (bsc#1182917)\n * sle15sp2/ipmitool-000020250.py: hanging on getting cipher suites (bsc#1185684)\n * sle15sp2/intelpstate_152-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon Scalable\n processors (bsc#1185758)\n * sle15sp2/ghostcat_152-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle15sp2/fcoe-000019889.py: System with FCoE connected devices fails to boot randomly due to wicked ordering cycle\n problems (bsc#1176140)\n * sle15sp1/qlogic-000019630.py: System crashes when the system is rebooted with SR-IOV enabled QLogic cards\n (bsc#1155990)\n * sle15sp1/passthrough-000019579.py: Passthrough of Raid Controller to KVM guest results in NMI and unresponsiveness\n on host (bsc#1152800)\n * sle15sp1/nfsperf-151-000019615.py: Performance loss when writing large files over NFS (bsc#1163403) \n * sle15sp1/nfsipv6_151-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162)\n * sle15sp1/nfit-000019688.py: dmesg shows NFIT related messages after updating the kernel (bsc#1159356)\n * sle15sp1/namespace-000019571.py: Activation of multiple namespaces simultaneously may lead to an activation\n failure (bsc#1157778)\n * sle15sp1/ipmi-000019602.py: IPMI driver can be unloaded when being accessed by user space (bsc#1154768)\n * sle15sp1/ghostcat_151-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle15sp1/edac-000019537.py: A kernel message shows EDAC amd64 Error F0 not found, device 0x1460 broken BIOS \n (bsc#1131489)\n * sle15sp1/docore_151-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1177753)\n * sle15sp0/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)\n * sle15sp0/ghostcat_150-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle15all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0\n * sle15all/vmcore-00002.pl: Detects the need for a kernel core analysis\n * sle15all/vmcore-00001.pl: Identifies kernel core dumps for review\n * sle15all/udevmac-000020260.py: systemd-udevd Could not generate persistent MAC address for br0 No such file or\n directory (bsc#1185357)\n * sle15all/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle15all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck\n * sle15all/softlock-000018705.py: soft lockup messages about\n * sle15all/slapd-000019711.py: slapd.service not enabled/failed after upgrade from SUSE Linux Enterprise 11 Service\n Pack 4 to SUSE Linux Enterprise 15 (bsc#1156353)\n * sle15all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition\n * sle15all/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL\n server (bsc#1183464)\n * sle15all/scc-registered.py: Check system registration status\n * sle15all/scc-expired.py: Identify if SCC registrations have expired\n * sle15all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1155181)\n * sle15all/scatool-000004685.py: scatool fails with traceback\n * sle15all/proxy-00003.pl: Checks for proxy environment variables\n * sle15all/postfix-000020356.py: Postfix fails to start with IPv6 disabled\n * sle15all/oomvsftpd-000020252.py: vsftpd and other processes terminated due to OOM scenario (bsc#1182905)\n * sle15all/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux\n Enterprise 15 Service Pack 2 (bsc#1176375)\n * sle15all/mysqlperf-000020354.py: mysqld segfault when the system is under stress (bsc#1186792)\n * sle15all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed (bsc#1179170)\n * sle15all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue\n * sle15all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata\n * sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for\n missing physical volumes.\n * sle15all/iscsimnts-000019648.py: Proper mount options for iSCSI drives\n * sle15all/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can\u0027t install (bsc#1187508)\n * sle15all/coredumpctl-000018634.py: How to obtain systemd service core dumps\n * sle15all/btrfsmaster-000018779.py: BTRFS Master TID\n * sle15all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled\n * sle15all/bhc-scc.sh: Pattern removed (bsc#1184594, bsc#1186317)\n * sle15all/acpid-000019708.py: acpid.service failed to start after upgrade (bsc#1158890)\n * CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)\n + sle15sp2/crosstalk_152-000019643.py\n + sle15sp1/crosstalk_151-000019643.py\n * CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353)\n + sle15sp2/ucodeintel_152-000019635.py\n + sle15sp1/ucodeintel_151-000019635.py\n + sle15sp0/ucodeintel_150-000019635.py\n- Renamed pattern files for filename standard\n * Renamed patterns/SLE/sle15all/scc-expired.py to patterns/SLE/sle15all/bhc-scc-expired.py\n * Renamed /SLE/sle15all/scc-registered.py to patterns/SLE/sle15all/bhc-scc-registered.py\n- Updated regular patterns:\n * sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for\n missing physical volumes\n\nsca-patterns-sle12:\n\n- Version update from 1.0.2 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Added Video link to coredumpctl-000018634.py\n * Added video links to patterns (bsc#1190460): \n + bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl\n * Fixed crosstalk message strings (bsc#1186312)\n * Fixed metadata tags for scc-registered.py\n * Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)\n * Requires Core library 1.3.3 which contains Core.logFullFile function\n * Updated registration link in bhc-scc-registered.py\n * Updated renewal link in bhc-scc-expired.py\n * Updated scc-registered.py pattern to fix registration detection\n- New security announcement patterns:\n * Apr 2022 (53) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1\n SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1\n SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1\n SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1\n SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1\n SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1\n SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1\n * Mar 2022 (127) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1\n SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1\n SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1\n SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1\n SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1\n SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1\n SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1\n SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1\n SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1\n SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1\n SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1\n SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1\n SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1\n SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1\n SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1\n SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1\n * Feb 2022 (169) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1\n SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1\n SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1\n SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1\n SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1\n SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1\n SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1\n SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1\n SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1\n SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1\n SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1\n SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1\n SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1\n SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1\n SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1\n SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1 \n SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1\n SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1\n SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1\n SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1\n SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1\n SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1\n SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1\n SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1\n * Jan 2022 (218) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1\n SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1\n SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1\n SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1\n SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1\n SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1\n SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1\n SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1\n SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1\n SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1\n SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1\n SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1\n SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1\n SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1\n SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1\n SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1\n SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1\n SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1\n SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1\n SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1\n SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1\n SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1\n SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1\n SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1\n SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0110-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0060-1\n SUSE-SU-2022:0118-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0061-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1\n SUSE-SU-2022:0212-1 SUSE-SU-2022:0032-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0080-1 SUSE-SU-2022:0068-1\n SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0081-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0160-1\n SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1\n SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0042-1 SUSE-SU-2022:0034-1\n SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1\n SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0030-1\n SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0041-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1\n SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1\n * Jun 2021 (80) for SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1929-1 SUSE-SU-2021:1838-1\n SUSE-SU-2021:1906-1 SUSE-SU-2021:1880-1 SUSE-SU-2021:1837-1 SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1\n SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1\n SUSE-SU-2021:2135-1 SUSE-SU-2021:1957-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2016-1 SUSE-SU-2021:1913-1\n SUSE-SU-2021:1887-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1959-1 SUSE-SU-2021:1822-1\n SUSE-SU-2021:2137-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1\n SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1947-1\n SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1\n SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:1891-1\n SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1\n SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1 SUSE-SU-2021:2014-1\n SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1894-1 SUSE-SU-2021:1842-1\n SUSE-SU-2021:2119-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1\n SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2060-1 SUSE-SU-2021:2042-1\n SUSE-SU-2021:2026-1 SUSE-SU-2021:1870-1 SUSE-SU-2021:1865-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1\n SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1\n SUSE-SU-2021:2006-1\n * May 2021 (39) for SUSE-SU-2021:1580-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1490-1 SUSE-SU-2021:1783-1\n SUSE-SU-2021:1782-1 SUSE-SU-2021:1576-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1524-1 SUSE-SU-2021:1766-1\n SUSE-SU-2021:1595-1 SUSE-SU-2021:1572-1 SUSE-SU-2021:1760-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1\n SUSE-SU-2021:1645-1 SUSE-SU-2021:1763-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1494-1 SUSE-SU-2021:1648-1\n SUSE-SU-2021:1492-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1596-1 SUSE-SU-2021:1646-1\n SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1786-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1492-1\n SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1623-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1\n SUSE-SU-2021:1645-1 SUSE-SU-2021:1469-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1617-1 SUSE-SU-2021:1469-1\n * Apr 2021 (69) for SUSE-SU-2021:1181-1 SUSE-SU-2021:1023-1 SUSE-SU-2021:1274-1 SUSE-SU-2021:1438-1\n SUSE-SU-2021:1242-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1396-1 SUSE-SU-2021:1325-1\n SUSE-SU-2021:1152-1 SUSE-SU-2021:1125-1 SUSE-SU-2021:1248-1 SUSE-SU-2021:1210-1 SUSE-SU-2021:1175-1\n SUSE-SU-2021:1435-1 SUSE-SU-2021:1314-1 SUSE-SU-2021:1277-1 SUSE-SU-2021:1030-1 SUSE-SU-2021:1165-1\n SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1174-1 SUSE-SU-2021:1159-1 SUSE-SU-2021:1315-1\n SUSE-SU-2021:1180-1 SUSE-SU-2021:1251-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1241-1 SUSE-SU-2021:1429-1\n SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1435-1\n SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1\n SUSE-SU-2021:1252-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1240-1 SUSE-SU-2021:1401-1\n SUSE-SU-2021:1399-1 SUSE-SU-2021:1373-1 SUSE-SU-2021:1341-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1\n SUSE-SU-2021:1075-1 SUSE-SU-2021:1074-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1\n SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1267-1 SUSE-SU-2021:1442-1\n SUSE-SU-2021:1439-1 SUSE-SU-2021:1305-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1\n SUSE-SU-2021:1152-1 SUSE-SU-2021:1148-1 SUSE-SU-2021:1145-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1\n * Mar 2021 New Security Announcement Patterns (79) for SUSE-SU-2021:0990-1 SUSE-SU-2021:0720-1\n SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0975-1 SUSE-SU-2021:0776-1 SUSE-SU-2021:0794-1\n SUSE-SU-2021:0886-1 SUSE-SU-2021:0887-1 SUSE-SU-2021:0675-1 SUSE-SU-2021:0987-1 SUSE-SU-2021:0954-1\n SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0998-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1\n SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0742-1 SUSE-SU-2021:0739-1\n SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0713-1 SUSE-SU-2021:0779-1\n SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1\n SUSE-SU-2020:2173-2 SUSE-SU-2021:0954-1 SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0693-1\n SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0736-1\n SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1\n SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1\n SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1\n SUSE-SU-2021:0743-1 SUSE-SU-2021:0682-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1\n SUSE-SU-2021:0929-1 SUSE-SU-2021:0928-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2\n SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0999-1\n SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1 SUSE-SU-2021:0744-1 SUSE-SU-2021:0679-1\n SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1\n- New regular patterns:\n * sle12sp5/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)\n * sle12sp5/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369)\n * sle12sp5/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12sp5/systemd_SUSE-SU-2021_2405-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL\n server (bsc#1183464)\n * sle12sp5/qemu_SUSE-SU-2021_2448-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5\n * sle12sp5/python-py_SUSE-SU-2021_2236-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5\n * sle12sp5/permissions_SUSE-SU-2021_2280-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5\n * sle12sp5/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from\n SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375)\n * sle12sp5/nfstimeout_125-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405)\n * sle12sp5/nfsperf-125-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)\n * sle12sp5/nfsipv6_125-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162)\n * sle12sp5/lscpu-000019784-12.py: lscpu segfaults on IBM Power8 - Assertion failed (bsc#1175623)\n * sle12sp5/linuxptp_SUSE-SU-2021_2545-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/kgraft-patch_SUSE-SU-2021_2462-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5\n * sle12sp5/kgraft-patch_SUSE-SU-2021_2389-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5\n * sle12sp5/kgraft-patch_SUSE-SU-2021_2324-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5\n * sle12sp5/kernel_SUSE-SU-2021_2416-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/kernel_SUSE-SU-2021_2407-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/kernel_SUSE-SU-2021_2321-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/intelpstate_125-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon\n Scalable processors (bsc#1185758)\n * sle12sp5/glibc_SUSE-SU-2021_2480-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/ghostcat_125-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle12sp5/docore_125-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194)\n * sle12sp5/dbus-1_SUSE-SU-2021_2424-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can\u0027t install (bsc#1187508)\n * sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)\n * sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)\n * sle12sp4/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)\n * sle12sp4/tcpdumpcore-000019666.py: Running tcpdump on a SUSE Linux Enterprise 12 Service Pack 4 System with Kernel\n 4.12.14-95.48-default may crash the system (bsc#1176579)\n * sle12sp4/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369)\n * sle12sp4/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12sp4/systemd_SUSE-SU-2021_2423-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS\n * sle12sp4/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL\n server (bsc#1183464)\n * sle12sp4/plymouth-000019595.py: plymouth hang - login to console not possible\n * sle12sp4/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux \n Enterprise 15 Service Pack 2 (bsc#1176375)\n * sle12sp4/nfsperf-124-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)\n * sle12sp4/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)\n * sle12sp4/linuxptp_SUSE-SU-2021_2443-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS\n * sle12sp4/kgraft-patch_SUSE-SU-2021_2546-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS\n * sle12sp4/kgraft-patch_SUSE-SU-2021_2389-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS\n * sle12sp4/kernel_SUSE-SU-2021_2422-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS\n * sle12sp4/ghostcat_124-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle12sp4/docore_124-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194)\n * sle12sp4/curl_SUSE-SU-2021_2425-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS\n * sle12sp4/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can\u0027t install (bsc#1187508)\n * sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)\n * sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)\n * sle12sp3/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12sp3/systemd_SUSE-SU-2021_2423-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS\n * sle12sp3/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)\n * sle12sp3/linuxptp_SUSE-SU-2021_2443-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS\n * sle12sp3/kgraft-patch_SUSE-SU-2021_2563-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n * sle12sp3/kgraft-patch_SUSE-SU-2021_2538-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n * sle12sp3/kgraft-patch_SUSE-SU-2021_2451-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n * sle12sp3/kgraft-patch_SUSE-SU-2021_2433-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n * sle12sp3/kgraft-patch_SUSE-SU-2021_2389-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n * sle12sp3/ghostcat_123-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle12sp2/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12sp2/ghostcat_122-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle12sp1/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12sp1/ghostcat_121-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle12sp0/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0\n * sle12all/zerologon-000019713.py: Zerologon aka CVE-2020-1472 (bsc#1176579)\n * sle12all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck\n * sle12all/softlock-000018705.py: soft lockup messages about\n * sle12all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition\n * sle12all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1186316)\n * sle12all/postfix-000020356.py: Postfix fails to start with IPv6 disabled\n * sle12all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed\n * sle12all/lvm-volume-list-7016683.py: Fixed execution error\n * sle12all/iscsimnts-000019648.py: Proper mount options for iSCSI drives\n * sle12all/coredumpctl-000018634.py: How to obtain systemd service core dumps\n * sle12all/btrfsmaster-000018779.py: BTRFS Master TID\n * sle12all/btrfscron-000019583.py: After upgrading BTRFS cron jobs are not working anymore (bsc#1159891)\n * sle12all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled\n * CVE-2020-12351, CVE-2020-12352, CVE-2020-24490: BleedingTooth\n + sle12sp5/bleedingtooth_125-000019735.py\n + sle12sp4/bleedingtooth_124-000019735.py\n + sle12sp3/bleedingtooth_123-000019735.py\n + sle12sp2/bleedingtooth_122-000019735.py\n * CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353)\n + sle12sp5/ucodeintel_125-000019635.py\n + sle12sp4/ucodeintel_124-000019635.py\n + sle12sp3/ucodeintel_123-000019635.py\n + sle12sp2/ucodeintel_122-000019635.py\n * CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)\n + sle12sp5/crosstalk_125-000019643.py\n + sle12sp4/crosstalk_124-000019643.py\n + sle12sp3/crosstalk_123-000019643.py\n + sle12sp2/crosstalk_122-000019643.py\n- Updated patterns:\n * sle12all/scc-expired.py: Identify if SCC registrations have expired\n * sle12all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for\n missing physical volumes\n * sle12all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata\n * sle12all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue\n- Renamed patterns for file standard:\n * Renamed patterns/SLE/sle12all/scc-expired.py to patterns/SLE/sle12all/bhc-scc-expired.py\n * Renamed patterns/SLE/sle12all/scc-registered.py to patterns/SLE/sle12all/bhc-scc-registered.py\n- Deleted regular patterns (1)\n * sle12all/systemd-current-failed-7017137.py: Moved to service packs with fixes (bsc#1187983)\n * sle12all/bhc-scc.sh: Pattern removed (bsc#1184594)\n * sle12all/pdc-00001.pl: Pattern removed OES Dependent\n * sle12all/pdc-00002.pl: Pattern removed OES Dependent\n * sle12all/lvm-00001.pl: Pattern removed\n * sle12all/lvm-00002.pl: Pattern removed\n\nsca-patterns-sle11:\n\n- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Removed OES dependent patterns (bsc#1196873)\n- New security announcement patterns:\n * Apr 2022 (5) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 \n SUSE-SU-2022:14951-1\n * Mar 2022 (19) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1\n SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1\n SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1\n SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1\n * Feb 2022 (27) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1\n SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1\n SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1\n SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1\n SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1\n SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1\n * Jan 2022 (34) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1\n SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1\n SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1\n SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1\n SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1\n SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1 SUSE-SU-2022:14880-1 SUSE-SU-2022:14881-1\n SUSE-SU-2022:14872-1 SUSE-SU-2022:14875-1 SUSE-SU-2022:14878-1 SUSE-SU-2022:14882-1 SUSE-SU-2022:14879-1\n * Jul 2021 (5) for SUSE-SU-2021:14769-1 SUSE-SU-2021:14771-1 SUSE-SU-2021:14766-1 SUSE-SU-2021:14764-1\n SUSE-SU-2021:14761-1\n * Jun 2021 (12) for SUSE-SU-2021:14747-1 SUSE-SU-2021:14748-1 SUSE-SU-2021:14744-1 SUSE-SU-2021:14757-1\n SUSE-SU-2021:14743-1 SUSE-SU-2021:14758-1 SUSE-SU-2021:14751-1 SUSE-SU-2021:14750-1 SUSE-SU-2021:14740-1\n SUSE-SU-2021:14760-1 SUSE-SU-2021:14759-1 SUSE-SU-2021:14749-1\n * May 2021 (5) for SUSE-SU-2021:14729-1 SUSE-SU-2021:14724-1 SUSE-SU-2021:14738-1 SUSE-SU-2021:14728-1\n SUSE-SU-2021:14714-1\n * Apr 2021 (10) for SUSE-SU-2021:14690-1 SUSE-SU-2021:14702-1 SUSE-SU-2021:14705-1 SUSE-SU-2021:14709-1\n SUSE-SU-2021:14700-1 SUSE-SU-2021:14708-1 SUSE-SU-2021:14684-1 SUSE-SU-2021:14704-1 SUSE-SU-2021:14712-1\n SUSE-SU-2021:14692-1\n- New regular patterns:\n * sle11sp4/ghostcat_114-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle11sp3/ghostcat_113-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle11all/softlock-000018705.py: soft lockup messages about\n * sle11all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition\n * sle11all/btrfsmaster-000018779.py: BTRFS Master TID\n * CVE-2020-0543: sle11sp4/crosstalk_114-000019643.py: Special Register Buffer Data Sampling aka CrossTalk\n (bsc#1154824)\n- Deleted regular patterns:\n * sle11all/bhc-scc.sh: Pattern removed (bsc#1184594)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-4496,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4496,openSUSE-SLE-15.3-2022-4496", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-fu-2022_4496-1.json" }, { "category": "self", "summary": "URL for SUSE-FU-2022:4496-1", "url": "https://www.suse.com/support/update/announcement//suse-fu-20224496-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-FU-2022:4496-1", "url": "https://lists.suse.com/pipermail/sle-updates/2022-December/026906.html" }, { "category": "self", "summary": "SUSE Bug 1045605", "url": "https://bugzilla.suse.com/1045605" }, { "category": "self", "summary": "SUSE Bug 1124793", "url": "https://bugzilla.suse.com/1124793" }, { "category": "self", "summary": "SUSE Bug 1131489", "url": "https://bugzilla.suse.com/1131489" }, { "category": "self", "summary": "SUSE Bug 1138452", "url": "https://bugzilla.suse.com/1138452" }, { "category": "self", "summary": "SUSE Bug 1144162", "url": "https://bugzilla.suse.com/1144162" }, { "category": "self", "summary": "SUSE Bug 1152800", "url": "https://bugzilla.suse.com/1152800" }, { "category": "self", "summary": "SUSE Bug 1154768", "url": "https://bugzilla.suse.com/1154768" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1155181", "url": "https://bugzilla.suse.com/1155181" }, { "category": "self", "summary": "SUSE Bug 1155990", "url": "https://bugzilla.suse.com/1155990" }, { "category": "self", "summary": "SUSE Bug 1156353", "url": "https://bugzilla.suse.com/1156353" }, { "category": "self", "summary": "SUSE Bug 1157778", "url": "https://bugzilla.suse.com/1157778" }, { "category": "self", "summary": "SUSE Bug 1158890", "url": "https://bugzilla.suse.com/1158890" }, { "category": "self", "summary": "SUSE Bug 1159356", "url": "https://bugzilla.suse.com/1159356" }, { "category": "self", "summary": "SUSE Bug 1159891", "url": "https://bugzilla.suse.com/1159891" }, { "category": "self", "summary": "SUSE Bug 1162119", "url": "https://bugzilla.suse.com/1162119" }, { "category": "self", "summary": "SUSE Bug 1163403", "url": "https://bugzilla.suse.com/1163403" }, { "category": "self", "summary": "SUSE Bug 1163508", "url": "https://bugzilla.suse.com/1163508" }, { "category": "self", "summary": "SUSE Bug 1164692", "url": "https://bugzilla.suse.com/1164692" }, { "category": "self", "summary": "SUSE Bug 1167689", "url": "https://bugzilla.suse.com/1167689" }, { "category": "self", "summary": "SUSE Bug 1175623", "url": "https://bugzilla.suse.com/1175623" }, { "category": "self", "summary": "SUSE Bug 1176021", "url": "https://bugzilla.suse.com/1176021" }, { "category": "self", "summary": "SUSE Bug 1176140", "url": "https://bugzilla.suse.com/1176140" }, { "category": "self", "summary": "SUSE Bug 1176375", "url": "https://bugzilla.suse.com/1176375" }, { "category": "self", "summary": "SUSE Bug 1176579", "url": "https://bugzilla.suse.com/1176579" }, { "category": "self", "summary": "SUSE Bug 1177369", "url": "https://bugzilla.suse.com/1177369" }, { "category": "self", "summary": "SUSE Bug 1177753", "url": "https://bugzilla.suse.com/1177753" }, { "category": "self", "summary": "SUSE Bug 1179170", "url": "https://bugzilla.suse.com/1179170" }, { "category": "self", "summary": "SUSE Bug 1180894", "url": "https://bugzilla.suse.com/1180894" }, { "category": "self", "summary": "SUSE Bug 1182194", "url": "https://bugzilla.suse.com/1182194" }, { "category": "self", "summary": "SUSE Bug 1182905", "url": "https://bugzilla.suse.com/1182905" }, { "category": "self", "summary": "SUSE Bug 1182917", "url": "https://bugzilla.suse.com/1182917" }, { "category": "self", "summary": "SUSE Bug 1183405", "url": "https://bugzilla.suse.com/1183405" }, { "category": "self", "summary": "SUSE Bug 1183464", "url": "https://bugzilla.suse.com/1183464" }, { "category": "self", "summary": "SUSE Bug 1184594", "url": "https://bugzilla.suse.com/1184594" }, { "category": "self", "summary": "SUSE Bug 1185357", "url": "https://bugzilla.suse.com/1185357" }, { "category": "self", "summary": "SUSE Bug 1185593", "url": "https://bugzilla.suse.com/1185593" }, { "category": "self", "summary": "SUSE Bug 1185594", "url": "https://bugzilla.suse.com/1185594" }, { "category": "self", "summary": "SUSE Bug 1185684", "url": "https://bugzilla.suse.com/1185684" }, { "category": "self", "summary": "SUSE Bug 1185758", "url": "https://bugzilla.suse.com/1185758" }, { "category": "self", "summary": "SUSE Bug 1185857", "url": "https://bugzilla.suse.com/1185857" }, { "category": "self", "summary": "SUSE Bug 1186034", "url": "https://bugzilla.suse.com/1186034" }, { "category": "self", "summary": "SUSE Bug 1186312", "url": "https://bugzilla.suse.com/1186312" }, { "category": "self", "summary": "SUSE Bug 1186316", "url": "https://bugzilla.suse.com/1186316" }, { "category": "self", "summary": "SUSE Bug 1186317", "url": "https://bugzilla.suse.com/1186317" }, { "category": "self", "summary": "SUSE Bug 1186420", "url": "https://bugzilla.suse.com/1186420" }, { "category": "self", "summary": "SUSE Bug 1186442", "url": "https://bugzilla.suse.com/1186442" }, { "category": "self", "summary": "SUSE Bug 1186792", "url": "https://bugzilla.suse.com/1186792" }, { "category": "self", "summary": "SUSE Bug 1187194", "url": "https://bugzilla.suse.com/1187194" }, { "category": "self", "summary": "SUSE Bug 1187508", "url": "https://bugzilla.suse.com/1187508" }, { "category": "self", "summary": "SUSE Bug 1187983", "url": "https://bugzilla.suse.com/1187983" }, { "category": "self", "summary": "SUSE Bug 1189394", "url": "https://bugzilla.suse.com/1189394" }, { "category": "self", "summary": "SUSE Bug 1189483", "url": "https://bugzilla.suse.com/1189483" }, { "category": "self", "summary": "SUSE Bug 1189889", "url": "https://bugzilla.suse.com/1189889" }, { "category": "self", "summary": "SUSE Bug 1190260", "url": "https://bugzilla.suse.com/1190260" }, { "category": "self", "summary": "SUSE Bug 1190460", "url": "https://bugzilla.suse.com/1190460" }, { "category": "self", "summary": "SUSE Bug 1191005", "url": "https://bugzilla.suse.com/1191005" }, { "category": "self", "summary": "SUSE Bug 1191199", "url": "https://bugzilla.suse.com/1191199" }, { "category": "self", "summary": "SUSE Bug 1193878", "url": "https://bugzilla.suse.com/1193878" }, { "category": "self", "summary": "SUSE Bug 1196730", "url": "https://bugzilla.suse.com/1196730" }, { "category": "self", "summary": "SUSE Bug 1196873", "url": "https://bugzilla.suse.com/1196873" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0548 page", "url": "https://www.suse.com/security/cve/CVE-2020-0548/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0549 page", "url": "https://www.suse.com/security/cve/CVE-2020-0549/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1472 page", "url": "https://www.suse.com/security/cve/CVE-2020-1472/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" } ], "title": "Feature update for SCA patterns", "tracking": { "current_release_date": "2022-12-15T09:43:54Z", "generator": { "date": "2022-12-15T09:43:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-FU-2022:4496-1", "initial_release_date": "2022-12-15T09:43:54Z", "revision_history": [ { "date": "2022-12-15T09:43:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "sca-patterns-base-1.5.0-150300.10.3.1.noarch", "product": { "name": "sca-patterns-base-1.5.0-150300.10.3.1.noarch", "product_id": "sca-patterns-base-1.5.0-150300.10.3.1.noarch" } }, { "category": "product_version", "name": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "product": { "name": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "product_id": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch" } }, { "category": "product_version", "name": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "product": { "name": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "product_id": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch" } }, { "category": "product_version", "name": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "product": { "name": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "product_id": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch" } }, { "category": "product_version", "name": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "product": { "name": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "product_id": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch" } }, { "category": "product_version", "name": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "product": { "name": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "product_id": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch" } }, { "category": "product_version", "name": "sca-server-report-1.5.1-150300.11.3.1.noarch", "product": { "name": "sca-server-report-1.5.1-150300.11.3.1.noarch", "product_id": "sca-server-report-1.5.1-150300.11.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-base-1.5.0-150300.10.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch" }, "product_reference": "sca-patterns-base-1.5.0-150300.10.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch" }, "product_reference": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch" }, "product_reference": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch" }, "product_reference": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch" }, "product_reference": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch" }, "product_reference": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-server-report-1.5.1-150300.11.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch" }, "product_reference": "sca-server-report-1.5.1-150300.11.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-base-1.5.0-150300.10.3.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch" }, "product_reference": "sca-patterns-base-1.5.0-150300.10.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch" }, "product_reference": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch" }, "product_reference": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch" }, "product_reference": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch" }, "product_reference": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch" }, "product_reference": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-server-report-1.5.1-150300.11.3.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" }, "product_reference": "sca-server-report-1.5.1-150300.11.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-15T09:43:54Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-0548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0548" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0548", "url": "https://www.suse.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0548", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-15T09:43:54Z", "details": "moderate" } ], "title": "CVE-2020-0548" }, { "cve": "CVE-2020-0549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0549" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0549", "url": "https://www.suse.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0549", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-15T09:43:54Z", "details": "moderate" } ], "title": "CVE-2020-0549" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-15T09:43:54Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-15T09:43:54Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-1472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1472" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1472", "url": "https://www.suse.com/security/cve/CVE-2020-1472" }, { "category": "external", "summary": "SUSE Bug 1176579 for CVE-2020-1472", "url": "https://bugzilla.suse.com/1176579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-15T09:43:54Z", "details": "critical" } ], "title": "CVE-2020-1472" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-15T09:43:54Z", "details": "important" } ], "title": "CVE-2020-24490" } ] }
suse-su-2020:3484-1
Vulnerability from csaf_suse
Published
2020-11-23 11:49
Modified
2020-11-23 11:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bug fixes.
The following security bugs were fixed:
- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-8694: Insufficient access control for some Intel(R) Processors may have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1170415).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bnc#1176723).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-16120: Fixed a permissions issue in ovl_path_open() (bsc#1177470).
- CVE-2020-12351: Implemented a kABI workaround for bluetooth l2cap_ops filter addition (bsc#1177724).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25212: Fixed a TOCTOU mismatch in the NFS client code (bnc#1176381).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).
The following non-security bugs were fixed:
- 9P: Cast to loff_t before multiplying (git-fixes).
- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).
- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).
- ACPI: dock: fix enum-conversion warning (git-fixes).
- ACPI / extlog: Check for RDMSR failure (git-fixes).
- ACPI: NFIT: Fix comparison to '-ENXIO' (git-fixes).
- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card->ctl_files_rwlock (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -> 'Frequency' (git-fixes).
- amd-xgbe: Add a check for an skb in the timestamp path (git-fixes).
- amd-xgbe: Add additional dynamic debug messages (git-fixes).
- amd-xgbe: Add additional ethtool statistics (git-fixes).
- amd-xgbe: Add ethtool show/set channels support (git-fixes).
- amd-xgbe: Add ethtool show/set ring parameter support (git-fixes).
- amd-xgbe: Add ethtool support to retrieve SFP module info (git-fixes).
- amd-xgbe: Add hardware features debug output (git-fixes).
- amd-xgbe: Add NUMA affinity support for IRQ hints (git-fixes).
- amd-xgbe: Add NUMA affinity support for memory allocations (git-fixes).
- amd-xgbe: Add per queue Tx and Rx statistics (git-fixes).
- amd-xgbe: Advertise FEC support with the KR re-driver (git-fixes).
- amd-xgbe: Always attempt link training in KR mode (git-fixes).
- amd-xgbe: Be sure driver shuts down cleanly on module removal (git-fixes).
- amd-xgbe: Convert to generic power management (git-fixes).
- amd-xgbe: Fix debug output of max channel counts (git-fixes).
- amd-xgbe: Fix error path in xgbe_mod_init() (git-fixes).
- amd-xgbe: Fixes for working with PHYs that support 2.5GbE (git-fixes).
- amd-xgbe: Fix SFP PHY supported/advertised settings (git-fixes).
- amd-xgbe: fix spelling mistake: 'avialable' -> 'available' (git-fixes).
- amd-xgbe: Handle return code from software reset function (git-fixes).
- amd-xgbe: Improve SFP 100Mbps auto-negotiation (git-fixes).
- amd-xgbe: Interrupt summary bits are h/w version dependent (git-fixes).
- amd-xgbe: Limit the I2C error messages that are output (git-fixes).
- amd-xgbe: Mark expected switch fall-throughs (git-fixes).
- amd-xgbe: Optimize DMA channel interrupt enablement (git-fixes).
- amd-xgbe: Prepare for ethtool set-channel support (git-fixes).
- amd-xgbe: Read and save the port property registers during probe (git-fixes).
- amd-xgbe: Remove field that indicates SFP diagnostic support (git-fixes).
- amd-xgbe: remove unnecessary conversion to bool (git-fixes).
- amd-xgbe: Remove use of comm_owned field (git-fixes).
- amd-xgbe: Set the MDIO mode for 10000Base-T configuration (git-fixes).
- amd-xgbe: Simplify the burst length settings (git-fixes).
- amd-xgbe: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- amd-xgbe: use dma_mapping_error to check map errors (git-fixes).
- amd-xgbe: Use __napi_schedule() in BH context (git-fixes).
- amd-xgbe: Use the proper register during PTP initialization (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ata: sata_rcar: Fix DMA boundary mask (git-fixes).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blk-mq: order adding requests to hctx->dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi->io_pages is always initialized (bsc#1177749).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- bnxt: do not enable NAPI until rings are ready (networking-stable-20_09_11).
- bnxt_en: Check for zero dir entries in NVRAM (networking-stable-20_09_11).
- bpf: Zero-fill re-used per-cpu map element (git-fixes).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: fix incorrect updating of log root tree (bsc#1177687).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: remove root usage from can_overcommit (bsc#1131277).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- btrfs: take overcommit into account in inc_block_group_ro (bsc#1176560).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).
- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).
- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).
- can: peak_usb: add range checking in decode operations (git-fixes).
- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).
- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- ceph: fix memory leak in ceph_cleanup_snapid_map() (bsc#1178234).
- ceph: map snapid to anonymous bdev ID (bsc#1178234).
- ceph: promote to unsigned long long before shifting (bsc#1178187).
- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- clk: ti: clockdomain: fix static checker warning (git-fixes).
- coredump: fix crash when umh is disabled (bsc#1177753).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ccp - fix error handling (git-fixes).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- device property: Do not clear secondary pointer for shared primary firmware node (git-fixes).
- device property: Keep secondary firmware node secondary by type (git-fixes).
- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let's disable it at building out-of-tree codes
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- docs: ABI: sysfs-c2port: remove a duplicated entry (git-fixes).
- drbd: code cleanup by using sendpage_ok() to check page for kernel_sendpage() (bsc#1172873).
- drivers: net: add missing interrupt.h include (git-fixes).
- drivers/net/ethernet/marvell/mvmdio.c: Fix non OF case (git-fixes).
- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).
- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).
- drm/amdgpu: do not map BO in reserved region (git-fixes).
- drm/amdgpu: prevent double kfree ttm->sg (git-fixes).
- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).
- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).
- drm/gma500: fix error check (git-fixes).
- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).
- drm/i915: Force VT'd workarounds when running as a guest OS (git-fixes).
- drm/imx: tve remove extraneous type qualifier (git-fixes).
- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- drm/ttm: fix eviction valuable range check (git-fixes).
- drm/vc4: drv: Add error handding for bind (git-fixes).
- Drop sysctl files for dropped archs, add ppc64le and arm64 (bsc#1178838).
- ea43d9709f72 ('nvme: fix identify error status silent ignore')
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1112178).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- efivarfs: Replace invalid slashes with exclamation marks in dentries (git-fixes).
- Fix use after free in get_capset_info callback (git-fixes).
- ftrace: Fix recursion check for NMI test (git-fixes).
- ftrace: Handle tracing when switching between context (git-fixes).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- hv_netvsc: Add XDP support (bsc#1177819, bsc#1177820).
- hv_netvsc: deal with bpf API differences in 4.12 (bsc#1177819, bsc#1177820).
- hv_netvsc: Fix XDP refcnt for synthetic and VF NICs (bsc#1177819, bsc#1177820).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- ibmvnic: save changed mac address to adapter->mac_addr (bsc#1134760 ltc#177449 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio:adc:max1118 Fix alignment of timestamp and data leak issues (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- include/linux/swapops.h: correct guards for non_swap_entry() (git-fixes (mm/swap)).
- Input: adxl34x - clean up a data type in adxl34x_probe() (git-fixes).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (git-fixes).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.
- kthread_worker: prevent queuing delayed work from timer_fn when it is being canceled (git-fixes).
- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).
- leds: mt6323: move period calculation (git-fixes).
- libceph: clear con->out_msg on Policy::stateful_server faults (bsc#1178188).
- libceph: use sendpage_ok() in ceph_tcp_sendpage() (bsc#1172873).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- livepatch: Test if -fdump-ipa-clones is really available
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: handle lack of sband->bitrates in rates (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: platform: Improve queue set up flow for bug fixing (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (bsc#1177703).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mlx5 PPC ringsize workaround (bsc#1173432).
- mlx5: remove support for ib_get_vector_affinity (bsc#1174748).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: sdhci-of-esdhc: Handle pulse width detection erratum for more SoCs (git-fixes).
- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm: hugetlb: switch to css_tryget() in hugetlb_cgroup_charge_cgroup() (git-fixes (mm/hugetlb)).
- mm/ksm.c: do not WARN if page is still mapped in remove_stable_node() (git-fixes (mm/hugetlb)).
- mm/memcg: fix refcount error while moving and swapping (bsc#1178686).
- mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm() (bsc#1177685).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/mempolicy.c: use match_string() helper to simplify the code (git-fixes (mm/mempolicy)).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (git-fixes (mm/numa)).
- mm/page_owner.c: remove drain_all_pages from init_early_allocated_pages (git-fixes (mm/debug)).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm/page-writeback.c: use div64_ul() for u64-by-unsigned-long divide (git-fixes (mm/writeback)).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm/zsmalloc.c: fix build when CONFIG_COMPACTION=n (git-fixes (mm/zsmalloc)).
- mm/zsmalloc.c: fix race condition in zs_destroy_pool (git-fixes (mm/zsmalloc)).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- mm/zsmalloc.c: migration can leave pages in ZS_EMPTY indefinitely (git-fixes (mm/zsmalloc)).
- Move the upstreamed bluetooth fix into sorted section
- Move the upstreamed powercap fix into sorted sectio
- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: 8390: Fix manufacturer name in Kconfig help text (git-fixes).
- net: add WARN_ONCE in kernel_sendpage() for improper zero-copy send (bsc#1172873).
- net: amd: fix return type of ndo_start_xmit function (git-fixes).
- net/amd: Remove useless driver version (git-fixes).
- net: amd-xgbe: fix comparison to bitshift when dealing with a mask (git-fixes).
- net: amd-xgbe: Get rid of custom hex_dump_to_buffer() (git-fixes).
- net: apple: Fix manufacturer name in Kconfig help text (git-fixes).
- net: broadcom: Fix manufacturer name in Kconfig help text (git-fixes).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).
- netfilter: nat: can't use dst_hold on noref dst (bsc#1178878).
- net: Fix potential wrong skb->protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: introduce helper sendpage_ok() in include/linux/net.h (bsc#1172873).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- net/mlx5e: Take common TIR context settings into a function (bsc#1177740).
- net/mlx5e: Turn on HW tunnel offload in all TIRs (bsc#1177740).
- net: mvmdio: defer probe of orion-mdio if a clock is not ready (git-fixes).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: tc35815: Explicitly check NET_IP_ALIGN is not zero in tc35815_rx (git-fixes).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).
- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).
- NFSv4.1: fix handling of backchannel binding in BIND_CONN_TO_SESSION (bsc#1170630).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- nvme: 59c7c3caaaf8 ('fix possible hang when ns scanning fails during error recovery')
- nvme: add a Identify Namespace Identification Descriptor list quirk (bsc#1174748).
- nvme: do not update disk info for multipathed device (bsc#1171558).
- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1174748).
- nvme: fix deadlock caused by ANA update wrong locking (bsc#1174748).
- nvme: fix possible io failures when removing multipathed ns (bsc#1174748).
- nvme: make nvme_identify_ns propagate errors back (bsc#1174748).
- nvme: make nvme_report_ns_ids propagate error back (bsc#1174748).
- nvme-multipath: do not reset on unknown status (bsc#1174748).
- nvme: Namepace identification descriptor list is optional (bsc#1174748).
- nvme: pass status to nvme_error_status (bsc#1174748).
- nvme-rdma: Avoid double freeing of async event data (bsc#1174748).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- nvme: return error from nvme_alloc_ns() (bsc#1174748).
- nvme-tcp: check page by sendpage_ok() before calling kernel_sendpage() (bsc#1172873).
- p54: avoid accessing the data mapped to streaming DMA (git-fixes).
- pinctrl: intel: Set default bias in case no particular value given (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries/cpuidle: add polling idle for shared processor guests (bsc#1178765 ltc#188968).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- powerpc/vnic: Extend 'failover pending' window (bsc#1176855 ltc#187293).
- powerpc/vnic: Extend 'failover pending' window (bsc#1176855 ltc#187293).
- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).
- pty: do tty_flip_buffer_push without port->lock in pty_write (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- Revert 'cdc-acm: hardening against malicious devices' (git-fixes).
- ring-buffer: Fix recursion protection transitions between interrupt context (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886)
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtl8xxxu: prevent potential memory leak (git-fixes).
- scsi: fnic: Do not call 'scsi_done()' for unhandled commands (bsc#1168468, bsc#1171675).
- scsi: hisi_sas: Add debugfs ITCT file and add file operations (bsc#1140683).
- scsi: hisi_sas: Add manual trigger for debugfs dump (bsc#1140683).
- scsi: hisi_sas: Add missing seq_printf() call in hisi_sas_show_row_32() (bsc#1140683).
- scsi: hisi_sas: Change return variable type in phy_up_v3_hw() (bsc#1140683).
- scsi: hisi_sas: Correct memory allocation size for DQ debugfs (bsc#1140683).
- scsi: hisi_sas: Do some more tidy-up (bsc#1140683).
- scsi: hisi_sas: Fix a timeout race of driver internal and SMP IO (bsc#1140683).
- scsi: hisi_sas: Fix type casting and missing static qualifier in debugfs code (bsc#1140683). Refresh:
- scsi: hisi_sas: No need to check return value of debugfs_create functions (bsc#1140683). Update:
- scsi: hisi_sas: Some misc tidy-up (bsc#1140683).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: libiscsi: use sendpage_ok() in iscsi_tcp_segment_map() (bsc#1172873).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix memory size truncation (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Performance tweak (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1176946 bsc#1175520 bsc#1172538).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).
- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).
- staging: octeon: repair 'fixed-link' support (git-fixes).
- tg3: Fix soft lockup when tg3_reset_task() fails (networking-stable-20_09_11).
- thunderbolt: Add the missed ida_simple_remove() in ring_request_msix() (git-fixes).
- time: Prevent undefined behaviour in timespec64_to_ns() (git-fixes).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb->data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: earlycon dependency (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- Update patches.suse/vfs-add-super_operations-get_inode_dev (bsc#927455 bsc#1176983).
- USB: Add NO_LPM quirk for Kingston flash drive (git-fixes).
- USB: adutux: fix debugging (git-fixes).
- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- USB: cdc-acm: fix cooldown mechanism (git-fixes).
- usb: cdc-acm: handle broken union descriptors (git-fixes).
- usb: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- USB: core: driver: fix stray tabs in error messages (git-fixes).
- usb: core: Solve race condition in anchor cleanup functions (git-fixes).
- usb: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- usb: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- usb: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- usb: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- usb: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- usb: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- usb: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- USB: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).
- USB: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).
- usb: ohci: Default to per-port over-current protection (git-fixes).
- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).
- USB: serial: option: add Cellient MPL200 card (git-fixes).
- USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231 (git-fixes).
- USB: serial: option: add Quectel EC200T module support (git-fixes).
- USB: serial: option: add Telit FN980 composition 0x1055 (git-fixes).
- USB: serial: option: Add Telit FT980-KS composition (git-fixes).
- USB: serial: pl2303: add device-id for HP GC device (git-fixes).
- usb: serial: qcserial: fix altsetting probing (git-fixes).
- USB: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).
- USB: typec: tcpm: reset hard_reset_count for any disconnect (git-fixes).
- vfs: fix FIGETBSZ ioctl on an overlayfs file (bsc#1178202).
- video: fbdev: pvr2fb: initialize variables (git-fixes).
- video: fbdev: sis: fix null ptr dereference (git-fixes).
- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- vt: Disable KD_FONT_OP_COPY (bsc#1178589).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: iTCO_wdt: Export vendorsupport (bsc#1177101).
- watchdog: iTCO_wdt: Make ICH_RES_IO_SMI optional (bsc#1177101).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode->i_io_list with inode->i_lock (bsc#1177755).
- x86/apic: Unify duplicated local apic timer clockevent initialization (bsc#1112178).
- x86, fakenuma: Fix invalid starting node ID (git-fixes (mm/x86/fakenuma)).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1112178).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1058115 bsc#1176907).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen: XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
- xfs: avoid infinite loop when cancelling CoW blocks after writeback failure (bsc#1178027).
- xfs: do not update mtime on COW faults (bsc#1167030).
- xfs: fix a missing unlock on error in xfs_fs_map_blocks (git-fixes).
- xfs: fix flags argument to rmap lookup when converting shared file rmaps (git-fixes).
- xfs: fix rmap key and record comparison functions (git-fixes).
- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).
- xfs: limit entries returned when counting fsmap records (git-fixes).
- xgbe: no need to check return value of debugfs_create functions (git-fixes).
- xgbe: switch to more generic VxLAN detection (git-fixes).
Patchnames
SUSE-2020-3484,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-3484
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bug fixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).\n- CVE-2020-8694: Insufficient access control for some Intel(R) Processors may have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1170415).\n- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).\n- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).\n- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).\n- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).\n- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).\n- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bnc#1176723).\n- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).\n- CVE-2020-16120: Fixed a permissions issue in ovl_path_open() (bsc#1177470).\n- CVE-2020-12351: Implemented a kABI workaround for bluetooth l2cap_ops filter addition (bsc#1177724).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 (bsc#1177725).\n- CVE-2020-25212: Fixed a TOCTOU mismatch in the NFS client code (bnc#1176381).\n- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).\n\nThe following non-security bugs were fixed:\n\n- 9P: Cast to loff_t before multiplying (git-fixes).\n- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).\n- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).\n- ACPI: dock: fix enum-conversion warning (git-fixes).\n- ACPI / extlog: Check for RDMSR failure (git-fixes).\n- ACPI: NFIT: Fix comparison to \u0027-ENXIO\u0027 (git-fixes).\n- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).\n- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).\n- ALSA: compress_offload: remove redundant initialization (git-fixes).\n- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).\n- ALSA: core: pcm: simplify locking for timers (git-fixes).\n- ALSA: core: timer: clarify operator precedence (git-fixes).\n- ALSA: core: timer: remove redundant assignment (git-fixes).\n- ALSA: ctl: Workaround for lockdep warning wrt card-\u003ectl_files_rwlock (git-fixes).\n- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).\n- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).\n- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).\n- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).\n- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).\n- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).\n- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).\n- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).\n- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).\n- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).\n- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).\n- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).\n- ALSA: usb-audio: endpoint.c: fix repeated word \u0027there\u0027 (git-fixes).\n- ALSA: usb-audio: fix spelling mistake \u0027Frequence\u0027 -\u003e \u0027Frequency\u0027 (git-fixes).\n- amd-xgbe: Add a check for an skb in the timestamp path (git-fixes).\n- amd-xgbe: Add additional dynamic debug messages (git-fixes).\n- amd-xgbe: Add additional ethtool statistics (git-fixes).\n- amd-xgbe: Add ethtool show/set channels support (git-fixes).\n- amd-xgbe: Add ethtool show/set ring parameter support (git-fixes).\n- amd-xgbe: Add ethtool support to retrieve SFP module info (git-fixes).\n- amd-xgbe: Add hardware features debug output (git-fixes).\n- amd-xgbe: Add NUMA affinity support for IRQ hints (git-fixes).\n- amd-xgbe: Add NUMA affinity support for memory allocations (git-fixes).\n- amd-xgbe: Add per queue Tx and Rx statistics (git-fixes).\n- amd-xgbe: Advertise FEC support with the KR re-driver (git-fixes).\n- amd-xgbe: Always attempt link training in KR mode (git-fixes).\n- amd-xgbe: Be sure driver shuts down cleanly on module removal (git-fixes).\n- amd-xgbe: Convert to generic power management (git-fixes).\n- amd-xgbe: Fix debug output of max channel counts (git-fixes).\n- amd-xgbe: Fix error path in xgbe_mod_init() (git-fixes).\n- amd-xgbe: Fixes for working with PHYs that support 2.5GbE (git-fixes).\n- amd-xgbe: Fix SFP PHY supported/advertised settings (git-fixes).\n- amd-xgbe: fix spelling mistake: \u0027avialable\u0027 -\u003e \u0027available\u0027 (git-fixes).\n- amd-xgbe: Handle return code from software reset function (git-fixes).\n- amd-xgbe: Improve SFP 100Mbps auto-negotiation (git-fixes).\n- amd-xgbe: Interrupt summary bits are h/w version dependent (git-fixes).\n- amd-xgbe: Limit the I2C error messages that are output (git-fixes).\n- amd-xgbe: Mark expected switch fall-throughs (git-fixes).\n- amd-xgbe: Optimize DMA channel interrupt enablement (git-fixes).\n- amd-xgbe: Prepare for ethtool set-channel support (git-fixes).\n- amd-xgbe: Read and save the port property registers during probe (git-fixes).\n- amd-xgbe: Remove field that indicates SFP diagnostic support (git-fixes).\n- amd-xgbe: remove unnecessary conversion to bool (git-fixes).\n- amd-xgbe: Remove use of comm_owned field (git-fixes).\n- amd-xgbe: Set the MDIO mode for 10000Base-T configuration (git-fixes).\n- amd-xgbe: Simplify the burst length settings (git-fixes).\n- amd-xgbe: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- amd-xgbe: use dma_mapping_error to check map errors (git-fixes).\n- amd-xgbe: Use __napi_schedule() in BH context (git-fixes).\n- amd-xgbe: Use the proper register during PTP initialization (git-fixes).\n- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).\n- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).\n- ata: sata_rcar: Fix DMA boundary mask (git-fixes).\n- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).\n- ath10k: Fix the size used in a \u0027dma_free_coherent()\u0027 call in an error handling path (git-fixes).\n- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).\n- ath10k: provide survey info as accumulated data (git-fixes).\n- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).\n- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).\n- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).\n- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).\n- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).\n- blk-mq: order adding requests to hctx-\u003edispatch and checking SCHED_RESTART (bsc#1177750).\n- block: ensure bdi-\u003eio_pages is always initialized (bsc#1177749).\n- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).\n- Bluetooth: Only mark socket zapped after unlocking (git-fixes).\n- bnxt: do not enable NAPI until rings are ready (networking-stable-20_09_11).\n- bnxt_en: Check for zero dir entries in NVRAM (networking-stable-20_09_11).\n- bpf: Zero-fill re-used per-cpu map element (git-fixes).\n- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).\n- brcmfmac: check ndev pointer (git-fixes).\n- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).\n- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).\n- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).\n- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).\n- btrfs: fix incorrect updating of log root tree (bsc#1177687).\n- btrfs: fix race between page release and a fast fsync (bsc#1177687).\n- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).\n- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).\n- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).\n- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).\n- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).\n- btrfs: release old extent maps during page release (bsc#1177687).\n- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).\n- btrfs: remove root usage from can_overcommit (bsc#1131277).\n- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).\n- btrfs: take overcommit into account in inc_block_group_ro (bsc#1176560).\n- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).\n- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).\n- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).\n- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).\n- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).\n- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).\n- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).\n- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).\n- can: peak_usb: add range checking in decode operations (git-fixes).\n- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).\n- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).\n- can: softing: softing_card_shutdown(): add braces around empty body in an \u0027if\u0027 statement (git-fixes).\n- ceph: fix memory leak in ceph_cleanup_snapid_map() (bsc#1178234).\n- ceph: map snapid to anonymous bdev ID (bsc#1178234).\n- ceph: promote to unsigned long long before shifting (bsc#1178187).\n- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).\n- clk: at91: remove the checking of parent_name (git-fixes).\n- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).\n- clk: imx8mq: Fix usdhc parents order (git-fixes).\n- clk: ti: clockdomain: fix static checker warning (git-fixes).\n- coredump: fix crash when umh is disabled (bsc#1177753).\n- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).\n- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).\n- crypto: ccp - fix error handling (git-fixes).\n- crypto: ixp4xx - Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).\n- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).\n- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).\n- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).\n- device property: Do not clear secondary pointer for shared primary firmware node (git-fixes).\n- device property: Keep secondary firmware node secondary by type (git-fixes).\n- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let\u0027s disable it at building out-of-tree codes\n- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).\n- docs: ABI: sysfs-c2port: remove a duplicated entry (git-fixes).\n- drbd: code cleanup by using sendpage_ok() to check page for kernel_sendpage() (bsc#1172873).\n- drivers: net: add missing interrupt.h include (git-fixes).\n- drivers/net/ethernet/marvell/mvmdio.c: Fix non OF case (git-fixes).\n- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).\n- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).\n- drm/amdgpu: do not map BO in reserved region (git-fixes).\n- drm/amdgpu: prevent double kfree ttm-\u003esg (git-fixes).\n- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).\n- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).\n- drm/gma500: fix error check (git-fixes).\n- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).\n- drm/i915: Force VT\u0027d workarounds when running as a guest OS (git-fixes).\n- drm/imx: tve remove extraneous type qualifier (git-fixes).\n- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (git-fixes).\n- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).\n- drm/sun4i: mixer: Extend regmap max_register (git-fixes).\n- drm/ttm: fix eviction valuable range check (git-fixes).\n- drm/vc4: drv: Add error handding for bind (git-fixes).\n- Drop sysctl files for dropped archs, add ppc64le and arm64 (bsc#1178838).\n- ea43d9709f72 (\u0027nvme: fix identify error status silent ignore\u0027)\n- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1112178).\n- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).\n- efivarfs: Replace invalid slashes with exclamation marks in dentries (git-fixes).\n- Fix use after free in get_capset_info callback (git-fixes).\n- ftrace: Fix recursion check for NMI test (git-fixes).\n- ftrace: Handle tracing when switching between context (git-fixes).\n- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).\n- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).\n- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).\n- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).\n- hv_netvsc: Add XDP support (bsc#1177819, bsc#1177820).\n- hv_netvsc: deal with bpf API differences in 4.12 (bsc#1177819, bsc#1177820).\n- hv_netvsc: Fix XDP refcnt for synthetic and VF NICs (bsc#1177819, bsc#1177820).\n- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).\n- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).\n- i2c: meson: fix clock setting overwrite (git-fixes).\n- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).\n- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).\n- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).\n- ibmvnic: save changed mac address to adapter-\u003emac_addr (bsc#1134760 ltc#177449 git-fixes).\n- icmp: randomize the global rate limiter (git-fixes).\n- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).\n- iio:adc:max1118 Fix alignment of timestamp and data leak issues (git-fixes).\n- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).\n- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).\n- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).\n- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).\n- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).\n- include/linux/swapops.h: correct guards for non_swap_entry() (git-fixes (mm/swap)).\n- Input: adxl34x - clean up a data type in adxl34x_probe() (git-fixes).\n- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (git-fixes).\n- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).\n- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).\n- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).\n- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).\n- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).\n- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).\n- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).\n- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).\n- kbuild: enforce -Werror=return-type (bsc#1177281).\n- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.\n- kthread_worker: prevent queuing delayed work from timer_fn when it is being canceled (git-fixes).\n- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).\n- leds: mt6323: move period calculation (git-fixes).\n- libceph: clear con-\u003eout_msg on Policy::stateful_server faults (bsc#1178188).\n- libceph: use sendpage_ok() in ceph_tcp_sendpage() (bsc#1172873).\n- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).\n- livepatch: Test if -fdump-ipa-clones is really available \n- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).\n- mac80211: handle lack of sband-\u003ebitrates in rates (git-fixes).\n- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).\n- mailbox: avoid timer start from callback (git-fixes).\n- media: ati_remote: sanity check for both endpoints (git-fixes).\n- media: bdisp: Fix runtime PM imbalance on error (git-fixes).\n- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).\n- media: exynos4-is: Fix a reference count leak (git-fixes).\n- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).\n- media: firewire: fix memory leak (git-fixes).\n- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).\n- media: media/pci: prevent memory leak in bttv_probe (git-fixes).\n- media: omap3isp: Fix memleak in isp_probe (git-fixes).\n- media: platform: fcp: Fix a reference count leak (git-fixes).\n- media: platform: Improve queue set up flow for bug fixing (git-fixes).\n- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).\n- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).\n- media: Revert \u0027media: exynos4-is: Add missed check for pinctrl_lookup_state()\u0027 (git-fixes).\n- media: s5p-mfc: Fix a reference count leak (git-fixes).\n- media: saa7134: avoid a shift overflow (git-fixes).\n- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).\n- media: sti: Fix reference count leaks (git-fixes).\n- media: tc358743: initialize variable (git-fixes).\n- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).\n- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).\n- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).\n- media: usbtv: Fix refcounting mixup (git-fixes).\n- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).\n- media: vsp1: Fix runtime PM imbalance on error (git-fixes).\n- memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (bsc#1177703).\n- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).\n- memory: omap-gpmc: Fix a couple off by ones (git-fixes).\n- mfd: sm501: Fix leaks in probe() (git-fixes).\n- mic: vop: copy data to kernel space then write to io memory (git-fixes).\n- misc: mic: scif: Fix error handling path (git-fixes).\n- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).\n- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).\n- mlx5 PPC ringsize workaround (bsc#1173432).\n- mlx5: remove support for ib_get_vector_affinity (bsc#1174748).\n- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).\n- mmc: sdhci-of-esdhc: Handle pulse width detection erratum for more SoCs (git-fixes).\n- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).\n- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).\n- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).\n- mm: hugetlb: switch to css_tryget() in hugetlb_cgroup_charge_cgroup() (git-fixes (mm/hugetlb)).\n- mm/ksm.c: do not WARN if page is still mapped in remove_stable_node() (git-fixes (mm/hugetlb)).\n- mm/memcg: fix refcount error while moving and swapping (bsc#1178686).\n- mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm() (bsc#1177685).\n- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).\n- mm/mempolicy.c: use match_string() helper to simplify the code (git-fixes (mm/mempolicy)).\n- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (git-fixes (mm/numa)).\n- mm/page_owner.c: remove drain_all_pages from init_early_allocated_pages (git-fixes (mm/debug)).\n- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).\n- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).\n- mm/page-writeback.c: use div64_ul() for u64-by-unsigned-long divide (git-fixes (mm/writeback)).\n- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).\n- mm/zsmalloc.c: fix build when CONFIG_COMPACTION=n (git-fixes (mm/zsmalloc)).\n- mm/zsmalloc.c: fix race condition in zs_destroy_pool (git-fixes (mm/zsmalloc)).\n- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).\n- mm/zsmalloc.c: migration can leave pages in ZS_EMPTY indefinitely (git-fixes (mm/zsmalloc)).\n- Move the upstreamed bluetooth fix into sorted section\n- Move the upstreamed powercap fix into sorted sectio\n- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).\n- mtd: lpddr: fix excessive stack usage with clang (git-fixes).\n- mtd: mtdoops: Do not write panic data twice (git-fixes).\n- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).\n- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).\n- mwifiex: fix double free (git-fixes).\n- mwifiex: remove function pointer check (git-fixes).\n- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).\n- net: 8390: Fix manufacturer name in Kconfig help text (git-fixes).\n- net: add WARN_ONCE in kernel_sendpage() for improper zero-copy send (bsc#1172873).\n- net: amd: fix return type of ndo_start_xmit function (git-fixes).\n- net/amd: Remove useless driver version (git-fixes).\n- net: amd-xgbe: fix comparison to bitshift when dealing with a mask (git-fixes).\n- net: amd-xgbe: Get rid of custom hex_dump_to_buffer() (git-fixes).\n- net: apple: Fix manufacturer name in Kconfig help text (git-fixes).\n- net: broadcom: Fix manufacturer name in Kconfig help text (git-fixes).\n- net: disable netpoll on fresh napis (networking-stable-20_09_11).\n- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).\n- netfilter: nat: can\u0027t use dst_hold on noref dst (bsc#1178878).\n- net: Fix potential wrong skb-\u003eprotocol in skb_vlan_untag() (networking-stable-20_08_24).\n- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).\n- net: introduce helper sendpage_ok() in include/linux/net.h (bsc#1172873).\n- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).\n- netlabel: fix problems with mapping removal (networking-stable-20_09_11).\n- net/mlx5e: Take common TIR context settings into a function (bsc#1177740).\n- net/mlx5e: Turn on HW tunnel offload in all TIRs (bsc#1177740).\n- net: mvmdio: defer probe of orion-mdio if a clock is not ready (git-fixes).\n- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).\n- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).\n- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).\n- net: tc35815: Explicitly check NET_IP_ALIGN is not zero in tc35815_rx (git-fixes).\n- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).\n- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).\n- net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition (git-fixes).\n- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).\n- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).\n- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).\n- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).\n- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).\n- NFSv4.1: fix handling of backchannel binding in BIND_CONN_TO_SESSION (bsc#1170630).\n- nl80211: fix non-split wiphy information (git-fixes).\n- NTB: hw: amd: fix an issue about leak system resources (git-fixes).\n- nvme: 59c7c3caaaf8 (\u0027fix possible hang when ns scanning fails during error recovery\u0027)\n- nvme: add a Identify Namespace Identification Descriptor list quirk (bsc#1174748).\n- nvme: do not update disk info for multipathed device (bsc#1171558). \n- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1174748).\n- nvme: fix deadlock caused by ANA update wrong locking (bsc#1174748).\n- nvme: fix possible io failures when removing multipathed ns (bsc#1174748).\n- nvme: make nvme_identify_ns propagate errors back (bsc#1174748).\n- nvme: make nvme_report_ns_ids propagate error back (bsc#1174748).\n- nvme-multipath: do not reset on unknown status (bsc#1174748).\n- nvme: Namepace identification descriptor list is optional (bsc#1174748).\n- nvme: pass status to nvme_error_status (bsc#1174748).\n- nvme-rdma: Avoid double freeing of async event data (bsc#1174748).\n- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).\n- nvme-rdma: fix crash when connect rejected (bsc#1174748).\n- nvme: return error from nvme_alloc_ns() (bsc#1174748).\n- nvme-tcp: check page by sendpage_ok() before calling kernel_sendpage() (bsc#1172873).\n- p54: avoid accessing the data mapped to streaming DMA (git-fixes).\n- pinctrl: intel: Set default bias in case no particular value given (git-fixes).\n- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).\n- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).\n- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).\n- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).\n- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).\n- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).\n- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).\n- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).\n- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).\n- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).\n- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).\n- powerpc/pseries/cpuidle: add polling idle for shared processor guests (bsc#1178765 ltc#188968).\n- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).\n- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).\n- powerpc/vnic: Extend \u0027failover pending\u0027 window (bsc#1176855 ltc#187293).\n- powerpc/vnic: Extend \u0027failover pending\u0027 window (bsc#1176855 ltc#187293).\n- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).\n- pty: do tty_flip_buffer_push without port-\u003elock in pty_write (git-fixes).\n- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).\n- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).\n- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).\n- regulator: resolve supply after creating regulator (git-fixes).\n- Revert \u0027cdc-acm: hardening against malicious devices\u0027 (git-fixes).\n- ring-buffer: Fix recursion protection transitions between interrupt context (git-fixes).\n- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).\n- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886)\n- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)\n- rtl8xxxu: prevent potential memory leak (git-fixes).\n- scsi: fnic: Do not call \u0027scsi_done()\u0027 for unhandled commands (bsc#1168468, bsc#1171675).\n- scsi: hisi_sas: Add debugfs ITCT file and add file operations (bsc#1140683).\n- scsi: hisi_sas: Add manual trigger for debugfs dump (bsc#1140683).\n- scsi: hisi_sas: Add missing seq_printf() call in hisi_sas_show_row_32() (bsc#1140683).\n- scsi: hisi_sas: Change return variable type in phy_up_v3_hw() (bsc#1140683).\n- scsi: hisi_sas: Correct memory allocation size for DQ debugfs (bsc#1140683).\n- scsi: hisi_sas: Do some more tidy-up (bsc#1140683).\n- scsi: hisi_sas: Fix a timeout race of driver internal and SMP IO (bsc#1140683).\n- scsi: hisi_sas: Fix type casting and missing static qualifier in debugfs code (bsc#1140683). Refresh:\n- scsi: hisi_sas: No need to check return value of debugfs_create functions (bsc#1140683). Update:\n- scsi: hisi_sas: Some misc tidy-up (bsc#1140683).\n- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).\n- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).\n- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).\n- scsi: libiscsi: use sendpage_ok() in iscsi_tcp_segment_map() (bsc#1172873).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Performance tweak (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Remove unneeded variable \u0027rval\u0027 (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1176946 bsc#1175520 bsc#1172538).\n- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).\n- spi: fsl-espi: Only process interrupts for expected events (git-fixes).\n- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).\n- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).\n- staging: octeon: repair \u0027fixed-link\u0027 support (git-fixes).\n- tg3: Fix soft lockup when tg3_reset_task() fails (networking-stable-20_09_11).\n- thunderbolt: Add the missed ida_simple_remove() in ring_request_msix() (git-fixes).\n- time: Prevent undefined behaviour in timespec64_to_ns() (git-fixes).\n- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).\n- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).\n- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).\n- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).\n- tipc: fix uninit skb-\u003edata in tipc_nl_compat_dumpit() (networking-stable-20_08_24).\n- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).\n- tty: ipwireless: fix error handling (git-fixes).\n- tty: serial: earlycon dependency (git-fixes).\n- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).\n- Update patches.suse/vfs-add-super_operations-get_inode_dev (bsc#927455 bsc#1176983).\n- USB: Add NO_LPM quirk for Kingston flash drive (git-fixes).\n- USB: adutux: fix debugging (git-fixes).\n- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).\n- USB: cdc-acm: fix cooldown mechanism (git-fixes).\n- usb: cdc-acm: handle broken union descriptors (git-fixes).\n- usb: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).\n- USB: core: driver: fix stray tabs in error messages (git-fixes).\n- usb: core: Solve race condition in anchor cleanup functions (git-fixes).\n- usb: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).\n- usb: dwc2: Fix parameter type in function pointer prototype (git-fixes).\n- usb: dwc3: core: add phy cleanup for probe error handling (git-fixes).\n- usb: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).\n- usb: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).\n- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).\n- usb: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).\n- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).\n- usb: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).\n- USB: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).\n- USB: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).\n- usb: ohci: Default to per-port over-current protection (git-fixes).\n- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).\n- USB: serial: option: add Cellient MPL200 card (git-fixes).\n- USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231 (git-fixes).\n- USB: serial: option: add Quectel EC200T module support (git-fixes).\n- USB: serial: option: add Telit FN980 composition 0x1055 (git-fixes).\n- USB: serial: option: Add Telit FT980-KS composition (git-fixes).\n- USB: serial: pl2303: add device-id for HP GC device (git-fixes).\n- usb: serial: qcserial: fix altsetting probing (git-fixes).\n- USB: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).\n- USB: typec: tcpm: reset hard_reset_count for any disconnect (git-fixes).\n- vfs: fix FIGETBSZ ioctl on an overlayfs file (bsc#1178202).\n- video: fbdev: pvr2fb: initialize variables (git-fixes).\n- video: fbdev: sis: fix null ptr dereference (git-fixes).\n- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).\n- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).\n- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).\n- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).\n- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).\n- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).\n- vt: Disable KD_FONT_OP_COPY (bsc#1178589).\n- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).\n- watchdog: iTCO_wdt: Export vendorsupport (bsc#1177101).\n- watchdog: iTCO_wdt: Make ICH_RES_IO_SMI optional (bsc#1177101).\n- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).\n- writeback: Avoid skipping inode writeback (bsc#1177755).\n- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).\n- writeback: Protect inode-\u003ei_io_list with inode-\u003ei_lock (bsc#1177755).\n- x86/apic: Unify duplicated local apic timer clockevent initialization (bsc#1112178).\n- x86, fakenuma: Fix invalid starting node ID (git-fixes (mm/x86/fakenuma)).\n- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1112178).\n- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).\n- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1058115 bsc#1176907).\n- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).\n- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/events: add a new \u0027late EOI\u0027 evtchn framework (XSA-332 bsc#1177411).\n- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).\n- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).\n- xen/events: block rogue events for some time (XSA-332 bsc#1177411).\n- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).\n- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).\n- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).\n- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).\n- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).\n- xen/gntdev.c: Mark pages as dirty (bsc#1065600).\n- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen: XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).\n- xfs: avoid infinite loop when cancelling CoW blocks after writeback failure (bsc#1178027).\n- xfs: do not update mtime on COW faults (bsc#1167030).\n- xfs: fix a missing unlock on error in xfs_fs_map_blocks (git-fixes).\n- xfs: fix flags argument to rmap lookup when converting shared file rmaps (git-fixes).\n- xfs: fix rmap key and record comparison functions (git-fixes).\n- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).\n- xfs: limit entries returned when counting fsmap records (git-fixes).\n- xgbe: no need to check return value of debugfs_create functions (git-fixes).\n- xgbe: switch to more generic VxLAN detection (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3484,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-3484", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3484-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3484-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203484-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3484-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" }, { "category": "self", "summary": "SUSE Bug 1055014", "url": "https://bugzilla.suse.com/1055014" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1061843", "url": "https://bugzilla.suse.com/1061843" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066382", "url": "https://bugzilla.suse.com/1066382" }, { "category": "self", "summary": "SUSE Bug 1077428", "url": "https://bugzilla.suse.com/1077428" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1131277", "url": "https://bugzilla.suse.com/1131277" }, { "category": "self", "summary": "SUSE Bug 1134760", "url": "https://bugzilla.suse.com/1134760" }, { "category": "self", "summary": "SUSE Bug 1140683", "url": "https://bugzilla.suse.com/1140683" }, { "category": "self", "summary": "SUSE Bug 1163592", "url": "https://bugzilla.suse.com/1163592" }, { "category": "self", "summary": "SUSE Bug 1167030", "url": "https://bugzilla.suse.com/1167030" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1170415", "url": "https://bugzilla.suse.com/1170415" }, { "category": "self", "summary": "SUSE Bug 1170446", "url": "https://bugzilla.suse.com/1170446" }, { "category": "self", "summary": "SUSE Bug 1170630", "url": "https://bugzilla.suse.com/1170630" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1172873", "url": "https://bugzilla.suse.com/1172873" }, { "category": "self", "summary": "SUSE Bug 1173432", "url": "https://bugzilla.suse.com/1173432" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1175306", "url": "https://bugzilla.suse.com/1175306" }, { "category": "self", "summary": "SUSE Bug 1175520", "url": "https://bugzilla.suse.com/1175520" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1176354", "url": "https://bugzilla.suse.com/1176354" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176382", "url": "https://bugzilla.suse.com/1176382" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176560", "url": "https://bugzilla.suse.com/1176560" }, { "category": "self", "summary": "SUSE Bug 1176713", "url": "https://bugzilla.suse.com/1176713" }, { "category": "self", "summary": "SUSE Bug 1176723", "url": "https://bugzilla.suse.com/1176723" }, { "category": "self", "summary": "SUSE Bug 1176855", "url": "https://bugzilla.suse.com/1176855" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176946", "url": "https://bugzilla.suse.com/1176946" }, { "category": "self", "summary": "SUSE Bug 1176983", "url": "https://bugzilla.suse.com/1176983" }, { "category": "self", "summary": "SUSE Bug 1177027", "url": "https://bugzilla.suse.com/1177027" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177101", "url": "https://bugzilla.suse.com/1177101" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177281", "url": "https://bugzilla.suse.com/1177281" }, { "category": "self", "summary": "SUSE Bug 1177340", "url": "https://bugzilla.suse.com/1177340" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177513", "url": "https://bugzilla.suse.com/1177513" }, { "category": "self", "summary": "SUSE Bug 1177685", "url": "https://bugzilla.suse.com/1177685" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177703", "url": "https://bugzilla.suse.com/1177703" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177740", "url": "https://bugzilla.suse.com/1177740" }, { "category": "self", "summary": "SUSE Bug 1177749", "url": "https://bugzilla.suse.com/1177749" }, { "category": "self", "summary": "SUSE Bug 1177750", "url": "https://bugzilla.suse.com/1177750" }, { "category": "self", "summary": "SUSE Bug 1177753", "url": "https://bugzilla.suse.com/1177753" }, { "category": "self", "summary": "SUSE Bug 1177754", "url": "https://bugzilla.suse.com/1177754" }, { "category": "self", "summary": "SUSE Bug 1177755", "url": "https://bugzilla.suse.com/1177755" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177819", "url": "https://bugzilla.suse.com/1177819" }, { "category": "self", "summary": "SUSE Bug 1177820", "url": "https://bugzilla.suse.com/1177820" }, { "category": "self", "summary": "SUSE Bug 1177855", "url": "https://bugzilla.suse.com/1177855" }, { "category": "self", "summary": "SUSE Bug 1177856", "url": "https://bugzilla.suse.com/1177856" }, { "category": "self", "summary": "SUSE Bug 1177861", "url": "https://bugzilla.suse.com/1177861" }, { "category": "self", "summary": "SUSE Bug 1178003", "url": "https://bugzilla.suse.com/1178003" }, { "category": "self", "summary": "SUSE Bug 1178027", "url": "https://bugzilla.suse.com/1178027" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178166", "url": "https://bugzilla.suse.com/1178166" }, { "category": "self", "summary": "SUSE Bug 1178182", "url": "https://bugzilla.suse.com/1178182" }, { "category": "self", "summary": "SUSE Bug 1178185", "url": "https://bugzilla.suse.com/1178185" }, { "category": "self", "summary": "SUSE Bug 1178187", "url": "https://bugzilla.suse.com/1178187" }, { "category": "self", "summary": "SUSE Bug 1178188", "url": "https://bugzilla.suse.com/1178188" }, { "category": "self", "summary": "SUSE Bug 1178202", "url": "https://bugzilla.suse.com/1178202" }, { "category": "self", "summary": "SUSE Bug 1178234", "url": "https://bugzilla.suse.com/1178234" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178393", "url": "https://bugzilla.suse.com/1178393" }, { "category": "self", "summary": "SUSE Bug 1178589", "url": "https://bugzilla.suse.com/1178589" }, { "category": "self", "summary": "SUSE Bug 1178591", "url": "https://bugzilla.suse.com/1178591" }, { "category": "self", "summary": "SUSE Bug 1178622", "url": "https://bugzilla.suse.com/1178622" }, { "category": "self", "summary": "SUSE Bug 1178686", "url": "https://bugzilla.suse.com/1178686" }, { "category": "self", "summary": "SUSE Bug 1178700", "url": "https://bugzilla.suse.com/1178700" }, { "category": "self", "summary": "SUSE Bug 1178765", "url": "https://bugzilla.suse.com/1178765" }, { "category": "self", "summary": "SUSE Bug 1178782", "url": "https://bugzilla.suse.com/1178782" }, { "category": "self", "summary": "SUSE Bug 1178838", "url": "https://bugzilla.suse.com/1178838" }, { "category": "self", "summary": "SUSE Bug 1178878", "url": "https://bugzilla.suse.com/1178878" }, { "category": "self", "summary": "SUSE Bug 927455", "url": "https://bugzilla.suse.com/927455" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0430 page", "url": "https://www.suse.com/security/cve/CVE-2020-0430/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25669 page", "url": "https://www.suse.com/security/cve/CVE-2020-25669/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25704 page", "url": "https://www.suse.com/security/cve/CVE-2020-25704/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-11-23T11:49:49Z", "generator": { "date": "2020-11-23T11:49:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3484-1", "initial_release_date": "2020-11-23T11:49:49Z", "revision_history": [ { "date": "2020-11-23T11:49:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-8.52.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-8.52.1.noarch", "product_id": "kernel-devel-azure-4.12.14-8.52.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-8.52.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-8.52.1.noarch", "product_id": "kernel-source-azure-4.12.14-8.52.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-8.52.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-8.52.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-8.52.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-8.52.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-8.52.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-8.52.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-8.52.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-8.52.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-8.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-8.52.1.x86_64", "product": { "name": "kernel-azure-4.12.14-8.52.1.x86_64", "product_id": "kernel-azure-4.12.14-8.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-8.52.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-8.52.1.x86_64", "product_id": "kernel-azure-base-4.12.14-8.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-8.52.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-8.52.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-8.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-8.52.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-8.52.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-8.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-4.12.14-8.52.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-4.12.14-8.52.1.x86_64", "product_id": "kernel-azure-livepatch-devel-4.12.14-8.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-8.52.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-8.52.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-8.52.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-8.52.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-8.52.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-8.52.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-8.52.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-8.52.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-8.52.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-4.12.14-8.52.1.x86_64", "product": { "name": "reiserfs-kmp-azure-4.12.14-8.52.1.x86_64", "product_id": "reiserfs-kmp-azure-4.12.14-8.52.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-8.52.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-8.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-8.52.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-8.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-8.52.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-8.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-8.52.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-8.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-8.52.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-8.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-8.52.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-8.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0430" } ], "notes": [ { "category": "general", "text": "In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0430", "url": "https://www.suse.com/security/cve/CVE-2020-0430" }, { "category": "external", "summary": "SUSE Bug 1176723 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1176723" }, { "category": "external", "summary": "SUSE Bug 1178003 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1178003" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T11:49:49Z", "details": "important" } ], "title": "CVE-2020-0430" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T11:49:49Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T11:49:49Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T11:49:49Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T11:49:49Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T11:49:49Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T11:49:49Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T11:49:49Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T11:49:49Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T11:49:49Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25669" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25669", "url": "https://www.suse.com/security/cve/CVE-2020-25669" }, { "category": "external", "summary": "SUSE Bug 1178182 for CVE-2020-25669", "url": "https://bugzilla.suse.com/1178182" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T11:49:49Z", "details": "moderate" } ], "title": "CVE-2020-25669" }, { "cve": "CVE-2020-25704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25704" } ], "notes": [ { "category": "general", "text": "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25704", "url": "https://www.suse.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "SUSE Bug 1178393 for CVE-2020-25704", "url": "https://bugzilla.suse.com/1178393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T11:49:49Z", "details": "moderate" } ], "title": "CVE-2020-25704" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T11:49:49Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.52.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.52.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T11:49:49Z", "details": "moderate" } ], "title": "CVE-2020-8694" } ] }
suse-su-2020:2981-1
Vulnerability from csaf_suse
Published
2020-10-21 11:29
Modified
2020-10-21 11:29
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' aka 'BadChoice' (bsc#1177725).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).
- CVE-2020-25212: Fixed a TOCTOU mismatch in the NFS client code (bsc#1176381).
The following non-security bugs were fixed:
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: fix incorrect updating of log root tree (bsc#1177687).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- drm/amdgpu: prevent double kfree ttm->sg (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- ext4: fix dir_nlink behaviour (bsc#1177359).
- i2c: meson: fix clock setting overwrite (git-fixes).
- include/linux/swapops.h: correct guards for non_swap_entry() (git-fixes (mm/swap)).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- leds: mt6323: move period calculation (git-fixes).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm: hugetlb: switch to css_tryget() in hugetlb_cgroup_charge_cgroup() (git-fixes (mm/hugetlb)).
- mm/ksm.c: do not WARN if page is still mapped in remove_stable_node() (git-fixes (mm/hugetlb)).
- mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm() (bsc#1177685).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/mempolicy.c: use match_string() helper to simplify the code (git-fixes (mm/mempolicy)).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (git-fixes (mm/numa)).
- mm/page_owner.c: remove drain_all_pages from init_early_allocated_pages (git-fixes (mm/debug)).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm/page-writeback.c: use div64_ul() for u64-by-unsigned-long divide (git-fixes (mm/writeback)).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm/zsmalloc.c: fix build when CONFIG_COMPACTION=n (git-fixes (mm/zsmalloc)).
- mm/zsmalloc.c: fix race condition in zs_destroy_pool (git-fixes (mm/zsmalloc)).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- mm/zsmalloc.c: migration can leave pages in ZS_EMPTY indefinitely (git-fixes (mm/zsmalloc)).
- Move the upstreamed bluetooth fix into sorted section
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).
- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).
- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).
- nvme: add a Identify Namespace Identification Descriptor list quirk (bsc#1174748). add two previous futile attempts to fix the bug to blacklist.conf
- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1174748).
- nvme: fix deadlock caused by ANA update wrong locking (bsc#1174748).
- nvme: fix possible io failures when removing multipathed ns (bsc#1174748).
- nvme: make nvme_identify_ns propagate errors back (bsc#1174748).
- nvme: make nvme_report_ns_ids propagate error back (bsc#1174748).
- nvme-multipath: do not reset on unknown status (bsc#1174748).
- nvme: Namepace identification descriptor list is optional (bsc#1174748).
- nvme: pass status to nvme_error_status (bsc#1174748).
- nvme-rdma: Avoid double freeing of async event data (bsc#1174748).
- nvme: return error from nvme_alloc_ns() (bsc#1174748).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- pty: do tty_flip_buffer_push without port->lock in pty_write (git-fixes).
- scsi: hisi_sas: Add debugfs ITCT file and add file operations (bsc#1140683).
- scsi: hisi_sas: Add manual trigger for debugfs dump (bsc#1140683).
- scsi: hisi_sas: Add missing seq_printf() call in hisi_sas_show_row_32() (bsc#1140683).
- scsi: hisi_sas: Change return variable type in phy_up_v3_hw() (bsc#1140683).
- scsi: hisi_sas: Correct memory allocation size for DQ debugfs (bsc#1140683).
- scsi: hisi_sas: Do some more tidy-up (bsc#1140683).
- scsi: hisi_sas: Fix a timeout race of driver internal and SMP IO (bsc#1140683).
- scsi: hisi_sas: Fix type casting and missing static qualifier in debugfs code (bsc#1140683). Refresh:
- scsi: hisi_sas: No need to check return value of debugfs_create functions (bsc#1140683). Update:
- scsi: hisi_sas: Some misc tidy-up (bsc#1140683).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix memory size truncation (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Performance tweak (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1176946 bsc#1175520 bsc#1172538).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- tty: serial: earlycon dependency (git-fixes).
- x86, fakenuma: Fix invalid starting node ID (git-fixes (mm/x86/fakenuma)).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
Patchnames
SUSE-2020-2981,SUSE-SLE-HA-12-SP5-2020-2981,SUSE-SLE-Live-Patching-12-SP5-2020-2981,SUSE-SLE-SDK-12-SP5-2020-2981,SUSE-SLE-SERVER-12-SP5-2020-2981,SUSE-SLE-WE-12-SP5-2020-2981
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadChoice\u0027 (bsc#1177725).\n- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).\n- CVE-2020-25212: Fixed a TOCTOU mismatch in the NFS client code (bsc#1176381).\n\nThe following non-security bugs were fixed:\n\n- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).\n- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).\n- btrfs: fix incorrect updating of log root tree (bsc#1177687).\n- btrfs: fix race between page release and a fast fsync (bsc#1177687).\n- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).\n- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).\n- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).\n- btrfs: release old extent maps during page release (bsc#1177687).\n- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).\n- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).\n- drm/amdgpu: prevent double kfree ttm-\u003esg (git-fixes).\n- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).\n- drm/sun4i: mixer: Extend regmap max_register (git-fixes).\n- ext4: fix dir_nlink behaviour (bsc#1177359).\n- i2c: meson: fix clock setting overwrite (git-fixes).\n- include/linux/swapops.h: correct guards for non_swap_entry() (git-fixes (mm/swap)).\n- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).\n- leds: mt6323: move period calculation (git-fixes).\n- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).\n- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).\n- mfd: sm501: Fix leaks in probe() (git-fixes).\n- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).\n- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).\n- mm: hugetlb: switch to css_tryget() in hugetlb_cgroup_charge_cgroup() (git-fixes (mm/hugetlb)).\n- mm/ksm.c: do not WARN if page is still mapped in remove_stable_node() (git-fixes (mm/hugetlb)).\n- mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm() (bsc#1177685).\n- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).\n- mm/mempolicy.c: use match_string() helper to simplify the code (git-fixes (mm/mempolicy)).\n- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (git-fixes (mm/numa)).\n- mm/page_owner.c: remove drain_all_pages from init_early_allocated_pages (git-fixes (mm/debug)).\n- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).\n- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).\n- mm/page-writeback.c: use div64_ul() for u64-by-unsigned-long divide (git-fixes (mm/writeback)).\n- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).\n- mm/zsmalloc.c: fix build when CONFIG_COMPACTION=n (git-fixes (mm/zsmalloc)).\n- mm/zsmalloc.c: fix race condition in zs_destroy_pool (git-fixes (mm/zsmalloc)).\n- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).\n- mm/zsmalloc.c: migration can leave pages in ZS_EMPTY indefinitely (git-fixes (mm/zsmalloc)).\n- Move the upstreamed bluetooth fix into sorted section\n- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).\n- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).\n- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).\n- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nvme: add a Identify Namespace Identification Descriptor list quirk (bsc#1174748). add two previous futile attempts to fix the bug to blacklist.conf\n- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1174748).\n- nvme: fix deadlock caused by ANA update wrong locking (bsc#1174748).\n- nvme: fix possible io failures when removing multipathed ns (bsc#1174748).\n- nvme: make nvme_identify_ns propagate errors back (bsc#1174748). \n- nvme: make nvme_report_ns_ids propagate error back (bsc#1174748).\n- nvme-multipath: do not reset on unknown status (bsc#1174748).\n- nvme: Namepace identification descriptor list is optional (bsc#1174748).\n- nvme: pass status to nvme_error_status (bsc#1174748).\n- nvme-rdma: Avoid double freeing of async event data (bsc#1174748).\n- nvme: return error from nvme_alloc_ns() (bsc#1174748).\n- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).\n- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).\n- pty: do tty_flip_buffer_push without port-\u003elock in pty_write (git-fixes).\n- scsi: hisi_sas: Add debugfs ITCT file and add file operations (bsc#1140683).\n- scsi: hisi_sas: Add manual trigger for debugfs dump (bsc#1140683).\n- scsi: hisi_sas: Add missing seq_printf() call in hisi_sas_show_row_32() (bsc#1140683).\n- scsi: hisi_sas: Change return variable type in phy_up_v3_hw() (bsc#1140683).\n- scsi: hisi_sas: Correct memory allocation size for DQ debugfs (bsc#1140683).\n- scsi: hisi_sas: Do some more tidy-up (bsc#1140683).\n- scsi: hisi_sas: Fix a timeout race of driver internal and SMP IO (bsc#1140683).\n- scsi: hisi_sas: Fix type casting and missing static qualifier in debugfs code (bsc#1140683). Refresh:\n- scsi: hisi_sas: No need to check return value of debugfs_create functions (bsc#1140683). Update:\n- scsi: hisi_sas: Some misc tidy-up (bsc#1140683).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Performance tweak (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Remove unneeded variable \u0027rval\u0027 (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1176946 bsc#1175520 bsc#1172538).\n- spi: fsl-espi: Only process interrupts for expected events (git-fixes).\n- tty: serial: earlycon dependency (git-fixes).\n- x86, fakenuma: Fix invalid starting node ID (git-fixes (mm/x86/fakenuma)).\n- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2981,SUSE-SLE-HA-12-SP5-2020-2981,SUSE-SLE-Live-Patching-12-SP5-2020-2981,SUSE-SLE-SDK-12-SP5-2020-2981,SUSE-SLE-SERVER-12-SP5-2020-2981,SUSE-SLE-WE-12-SP5-2020-2981", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2981-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2981-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202981-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2981-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1140683", "url": "https://bugzilla.suse.com/1140683" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1172757", "url": "https://bugzilla.suse.com/1172757" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1175520", "url": "https://bugzilla.suse.com/1175520" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176713", "url": "https://bugzilla.suse.com/1176713" }, { "category": "self", "summary": "SUSE Bug 1176946", "url": "https://bugzilla.suse.com/1176946" }, { "category": "self", "summary": "SUSE Bug 1177027", "url": "https://bugzilla.suse.com/1177027" }, { "category": "self", "summary": "SUSE Bug 1177340", "url": "https://bugzilla.suse.com/1177340" }, { "category": "self", "summary": "SUSE Bug 1177359", "url": "https://bugzilla.suse.com/1177359" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177685", "url": "https://bugzilla.suse.com/1177685" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-10-21T11:29:25Z", "generator": { "date": "2020-10-21T11:29:25Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2981-1", "initial_release_date": "2020-10-21T11:29:25Z", "revision_history": [ { "date": "2020-10-21T11:29:25Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.46.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.46.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.46.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-122.46.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.46.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-122.46.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.46.1.aarch64", "product": { "name": "kernel-default-4.12.14-122.46.1.aarch64", "product_id": "kernel-default-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.46.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-122.46.1.aarch64", "product_id": "kernel-default-base-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.46.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-122.46.1.aarch64", "product_id": "kernel-default-devel-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.46.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-122.46.1.aarch64", "product_id": "kernel-default-extra-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.46.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-122.46.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.46.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.46.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.46.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-122.46.1.aarch64", "product_id": "kernel-obs-build-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.46.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-122.46.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.46.1.aarch64", "product": { "name": "kernel-syms-4.12.14-122.46.1.aarch64", "product_id": "kernel-syms-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.46.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-122.46.1.aarch64", "product_id": "kernel-vanilla-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.46.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-122.46.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.46.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.46.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.46.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.46.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.46.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-122.46.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-122.46.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.46.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.46.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-122.46.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-122.46.1.noarch", "product": { "name": "kernel-devel-4.12.14-122.46.1.noarch", "product_id": "kernel-devel-4.12.14-122.46.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-122.46.1.noarch", "product": { "name": "kernel-docs-4.12.14-122.46.1.noarch", "product_id": "kernel-docs-4.12.14-122.46.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-122.46.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-122.46.1.noarch", "product_id": "kernel-docs-html-4.12.14-122.46.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-122.46.1.noarch", "product": { "name": "kernel-macros-4.12.14-122.46.1.noarch", "product_id": "kernel-macros-4.12.14-122.46.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-122.46.1.noarch", "product": { "name": "kernel-source-4.12.14-122.46.1.noarch", "product_id": "kernel-source-4.12.14-122.46.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-122.46.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-122.46.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-122.46.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.46.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-122.46.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.46.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-122.46.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.46.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-122.46.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-122.46.1.ppc64le", "product_id": "kernel-debug-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-122.46.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-122.46.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.46.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-default-4.12.14-122.46.1.ppc64le", "product_id": "kernel-default-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-122.46.1.ppc64le", "product_id": "kernel-default-base-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-122.46.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-122.46.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-122.46.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-122.46.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-122.46.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-122.46.1.ppc64le", "product_id": "kernel-syms-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-122.46.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-122.46.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-122.46.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.46.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.46.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.46.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-122.46.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-122.46.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.46.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-122.46.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-122.46.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.46.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-122.46.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.46.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-122.46.1.s390x", "product_id": "dlm-kmp-default-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.46.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-122.46.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.46.1.s390x", "product": { "name": "kernel-default-4.12.14-122.46.1.s390x", "product_id": "kernel-default-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.46.1.s390x", "product": { "name": "kernel-default-base-4.12.14-122.46.1.s390x", "product_id": "kernel-default-base-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.46.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-122.46.1.s390x", "product_id": "kernel-default-devel-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.46.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-122.46.1.s390x", "product_id": "kernel-default-extra-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.46.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-122.46.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.46.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.46.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-122.46.1.s390x", "product": { "name": "kernel-default-man-4.12.14-122.46.1.s390x", "product_id": "kernel-default-man-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.46.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-122.46.1.s390x", "product_id": "kernel-obs-build-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.46.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-122.46.1.s390x", "product_id": "kernel-obs-qa-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.46.1.s390x", "product": { "name": "kernel-syms-4.12.14-122.46.1.s390x", "product_id": "kernel-syms-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.46.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-122.46.1.s390x", "product_id": "kernel-vanilla-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.46.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-122.46.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.46.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-122.46.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.46.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.46.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-122.46.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-122.46.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-122.46.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-122.46.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x", "product_id": "kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.46.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-122.46.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-122.46.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.46.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-122.46.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-122.46.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.46.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.46.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.46.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-122.46.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.46.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-122.46.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-debug-4.12.14-122.46.1.x86_64", "product_id": "kernel-debug-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-122.46.1.x86_64", "product_id": "kernel-debug-base-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-122.46.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.46.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-default-4.12.14-122.46.1.x86_64", "product_id": "kernel-default-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-122.46.1.x86_64", "product_id": "kernel-default-base-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-122.46.1.x86_64", "product_id": "kernel-default-devel-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-122.46.1.x86_64", "product_id": "kernel-default-extra-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-122.46.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-122.46.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-122.46.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-122.46.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.46.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-122.46.1.x86_64", "product_id": "kernel-obs-build-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-122.46.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-syms-4.12.14-122.46.1.x86_64", "product_id": "kernel-syms-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-122.46.1.x86_64", "product_id": "kernel-vanilla-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-122.46.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.46.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.46.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.46.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.46.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-122.46.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-122.46.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.46.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.46.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-122.46.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.46.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.46.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.46.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-122.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.46.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-122.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.46.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-122.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.46.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.46.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.46.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.46.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-122.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.46.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-122.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-122.46.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.46.1.noarch" }, "product_reference": "kernel-docs-4.12.14-122.46.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.46.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-122.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.46.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-122.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.46.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-122.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.46.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.46.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.46.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.46.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.46.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.46.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.46.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.46.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.46.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.46.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.46.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.46.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.46.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.46.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.46.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.46.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.46.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.46.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.46.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.46.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.46.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.46.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.46.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.46.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.46.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.46.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.46.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.46.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.46.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.46.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.46.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.46.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.46.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.46.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.46.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-122.46.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.46.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-122.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-21T11:29:25Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-21T11:29:25Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-21T11:29:25Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.46.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-21T11:29:25Z", "details": "important" } ], "title": "CVE-2020-25645" } ] }
suse-su-2020:2972-1
Vulnerability from csaf_suse
Published
2020-10-20 15:08
Modified
2020-10-20 15:08
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' aka 'BadChoice' (bsc#1177725).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).
The following non-security bugs were fixed:
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm() (bsc#1177685).
- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).
- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).
- nvme: add a Identify Namespace Identification Descriptor list quirk (bsc#1174748). add two previous futile attempts to fix the bug to blacklist.conf
- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1174748).
- nvme: fix deadlock caused by ANA update wrong locking (bsc#1174748).
- nvme: fix possible io failures when removing multipathed ns (bsc#1174748).
- nvme: make nvme_identify_ns propagate errors back (bsc#1174748). Refresh: - patches.suse/nvme-flush-scan_work-when-resetting-controller.patch
- nvme: make nvme_report_ns_ids propagate error back (bsc#1174748).
- nvme-multipath: do not reset on unknown status (bsc#1174748).
- nvme: Namepace identification descriptor list is optional (bsc#1174748).
- nvme: pass status to nvme_error_status (bsc#1174748).
- nvme-rdma: Avoid double freeing of async event data (bsc#1174748).
- nvme: return error from nvme_alloc_ns() (bsc#1174748).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- scsi-hisi-kabi-fixes.patch
- scsi-hisi-kabi-fixes.patch
- scsi: hisi_sas: Add debugfs ITCT file and add file operations (bsc#1140683).
- scsi: hisi_sas: Add manual trigger for debugfs dump (bsc#1140683).
- scsi: hisi_sas: Add missing seq_printf() call in hisi_sas_show_row_32() (bsc#1140683).
- scsi: hisi_sas: Change return variable type in phy_up_v3_hw() (bsc#1140683).
- scsi: hisi_sas: Correct memory allocation size for DQ debugfs (bsc#1140683).
- scsi: hisi_sas: Do some more tidy-up (bsc#1140683).
- scsi: hisi_sas: Fix a timeout race of driver internal and SMP IO (bsc#1140683).
- scsi: hisi_sas: Fix type casting and missing static qualifier in debugfs code (bsc#1140683). Refresh:
- scsi-hisi_sas-Issue-internal-abort-on-all-relevant-q.patch
- scsi: hisi_sas: No need to check return value of debugfs_create functions (bsc#1140683). Update:
- scsi: hisi_sas: Some misc tidy-up (bsc#1140683).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix memory size truncation (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Performance tweak (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1176946 bsc#1175520 bsc#1172538).
Patchnames
SUSE-2020-2972,SUSE-SLE-Module-Basesystem-15-SP1-2020-2972,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2972,SUSE-SLE-Module-Legacy-15-SP1-2020-2972,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2972,SUSE-SLE-Product-HA-15-SP1-2020-2972,SUSE-SLE-Product-WE-15-SP1-2020-2972
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadChoice\u0027 (bsc#1177725).\n- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).\n\n\nThe following non-security bugs were fixed:\n\n- drm/sun4i: mixer: Extend regmap max_register (git-fixes).\n- i2c: meson: fix clock setting overwrite (git-fixes).\n- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).\n- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).\n- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).\n- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).\n- mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm() (bsc#1177685).\n- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).\n- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).\n- nvme: add a Identify Namespace Identification Descriptor list quirk (bsc#1174748). add two previous futile attempts to fix the bug to blacklist.conf\n- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1174748).\n- nvme: fix deadlock caused by ANA update wrong locking (bsc#1174748).\n- nvme: fix possible io failures when removing multipathed ns (bsc#1174748).\n- nvme: make nvme_identify_ns propagate errors back (bsc#1174748). Refresh: - patches.suse/nvme-flush-scan_work-when-resetting-controller.patch\n- nvme: make nvme_report_ns_ids propagate error back (bsc#1174748).\n- nvme-multipath: do not reset on unknown status (bsc#1174748).\n- nvme: Namepace identification descriptor list is optional (bsc#1174748).\n- nvme: pass status to nvme_error_status (bsc#1174748).\n- nvme-rdma: Avoid double freeing of async event data (bsc#1174748).\n- nvme: return error from nvme_alloc_ns() (bsc#1174748).\n- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).\n- scsi-hisi-kabi-fixes.patch\n- scsi-hisi-kabi-fixes.patch\n- scsi: hisi_sas: Add debugfs ITCT file and add file operations (bsc#1140683).\n- scsi: hisi_sas: Add manual trigger for debugfs dump (bsc#1140683).\n- scsi: hisi_sas: Add missing seq_printf() call in hisi_sas_show_row_32() (bsc#1140683).\n- scsi: hisi_sas: Change return variable type in phy_up_v3_hw() (bsc#1140683).\n- scsi: hisi_sas: Correct memory allocation size for DQ debugfs (bsc#1140683).\n- scsi: hisi_sas: Do some more tidy-up (bsc#1140683).\n- scsi: hisi_sas: Fix a timeout race of driver internal and SMP IO (bsc#1140683).\n- scsi: hisi_sas: Fix type casting and missing static qualifier in debugfs code (bsc#1140683). Refresh:\n- scsi-hisi_sas-Issue-internal-abort-on-all-relevant-q.patch\n- scsi: hisi_sas: No need to check return value of debugfs_create functions (bsc#1140683). Update:\n- scsi: hisi_sas: Some misc tidy-up (bsc#1140683).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Performance tweak (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Remove unneeded variable \u0027rval\u0027 (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1176946 bsc#1175520 bsc#1172538).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2972,SUSE-SLE-Module-Basesystem-15-SP1-2020-2972,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2972,SUSE-SLE-Module-Legacy-15-SP1-2020-2972,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2972,SUSE-SLE-Product-HA-15-SP1-2020-2972,SUSE-SLE-Product-WE-15-SP1-2020-2972", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2972-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2972-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202972-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2972-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-October/007592.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1140683", "url": "https://bugzilla.suse.com/1140683" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1175520", "url": "https://bugzilla.suse.com/1175520" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176946", "url": "https://bugzilla.suse.com/1176946" }, { "category": "self", "summary": "SUSE Bug 1177027", "url": "https://bugzilla.suse.com/1177027" }, { "category": "self", "summary": "SUSE Bug 1177340", "url": "https://bugzilla.suse.com/1177340" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177685", "url": "https://bugzilla.suse.com/1177685" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-10-20T15:08:23Z", "generator": { "date": "2020-10-20T15:08:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2972-1", "initial_release_date": "2020-10-20T15:08:23Z", "revision_history": [ { "date": "2020-10-20T15:08:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.64.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.64.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.64.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-197.64.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.64.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-197.64.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.64.1.aarch64", "product": { "name": "kernel-default-4.12.14-197.64.1.aarch64", "product_id": "kernel-default-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.64.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-197.64.1.aarch64", "product_id": "kernel-default-base-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.64.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-197.64.1.aarch64", "product_id": "kernel-default-devel-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.64.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-197.64.1.aarch64", "product_id": "kernel-default-extra-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.64.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-197.64.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.64.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.64.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.64.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-197.64.1.aarch64", "product_id": "kernel-obs-build-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.64.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-197.64.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.64.1.aarch64", "product": { "name": "kernel-syms-4.12.14-197.64.1.aarch64", "product_id": "kernel-syms-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.64.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-197.64.1.aarch64", "product_id": "kernel-vanilla-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.64.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-197.64.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.64.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.64.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.64.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.64.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.64.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-197.64.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.64.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.64.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-197.64.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.64.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.64.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-197.64.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-197.64.1.noarch", "product": { "name": "kernel-devel-4.12.14-197.64.1.noarch", "product_id": "kernel-devel-4.12.14-197.64.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-197.64.1.noarch", "product": { "name": "kernel-docs-4.12.14-197.64.1.noarch", "product_id": "kernel-docs-4.12.14-197.64.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-197.64.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-197.64.1.noarch", "product_id": "kernel-docs-html-4.12.14-197.64.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-197.64.1.noarch", "product": { "name": "kernel-macros-4.12.14-197.64.1.noarch", "product_id": "kernel-macros-4.12.14-197.64.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-197.64.1.noarch", "product": { "name": "kernel-source-4.12.14-197.64.1.noarch", "product_id": "kernel-source-4.12.14-197.64.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-197.64.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-197.64.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-197.64.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.64.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-197.64.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.64.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-197.64.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.64.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-197.64.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-197.64.1.ppc64le", "product_id": "kernel-debug-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-197.64.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-197.64.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.64.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-default-4.12.14-197.64.1.ppc64le", "product_id": "kernel-default-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-197.64.1.ppc64le", "product_id": "kernel-default-base-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-197.64.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-197.64.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-197.64.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.64.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_64-default-1-3.3.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_64-default-1-3.3.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_64-default-1-3.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-197.64.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-197.64.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-197.64.1.ppc64le", "product_id": "kernel-syms-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-197.64.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-197.64.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-197.64.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.64.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.64.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.64.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-197.64.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.64.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-197.64.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-197.64.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.64.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-197.64.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-197.64.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.64.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-197.64.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.64.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-197.64.1.s390x", "product_id": "dlm-kmp-default-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.64.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-197.64.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.64.1.s390x", "product": { "name": "kernel-default-4.12.14-197.64.1.s390x", "product_id": "kernel-default-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.64.1.s390x", "product": { "name": "kernel-default-base-4.12.14-197.64.1.s390x", "product_id": "kernel-default-base-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.64.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-197.64.1.s390x", "product_id": "kernel-default-devel-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.64.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-197.64.1.s390x", "product_id": "kernel-default-extra-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.64.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-197.64.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.64.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.64.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-197.64.1.s390x", "product": { "name": "kernel-default-man-4.12.14-197.64.1.s390x", "product_id": "kernel-default-man-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.64.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-197.64.1.s390x", "product_id": "kernel-obs-build-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.64.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-197.64.1.s390x", "product_id": "kernel-obs-qa-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.64.1.s390x", "product": { "name": "kernel-syms-4.12.14-197.64.1.s390x", "product_id": "kernel-syms-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.64.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-197.64.1.s390x", "product_id": "kernel-vanilla-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.64.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-197.64.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.64.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-197.64.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.64.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.64.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-197.64.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-197.64.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-197.64.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-197.64.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.64.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-197.64.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.64.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-197.64.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-197.64.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.64.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-197.64.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-197.64.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.64.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.64.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.64.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-197.64.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.64.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-197.64.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-debug-4.12.14-197.64.1.x86_64", "product_id": "kernel-debug-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-197.64.1.x86_64", "product_id": "kernel-debug-base-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-197.64.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.64.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-default-4.12.14-197.64.1.x86_64", "product_id": "kernel-default-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-197.64.1.x86_64", "product_id": "kernel-default-base-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-197.64.1.x86_64", "product_id": "kernel-default-devel-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-197.64.1.x86_64", "product_id": "kernel-default-extra-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-197.64.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.64.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-197.64.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-197.64.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-197.64.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.64.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_64-default-1-3.3.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_64-default-1-3.3.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_64-default-1-3.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-197.64.1.x86_64", "product_id": "kernel-obs-build-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-197.64.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-syms-4.12.14-197.64.1.x86_64", "product_id": "kernel-syms-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-197.64.1.x86_64", "product_id": "kernel-vanilla-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-197.64.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.64.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.64.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.64.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.64.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-197.64.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.64.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.64.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-197.64.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.64.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.64.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-197.64.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.64.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.64.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.64.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.64.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.64.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.s390x" }, "product_reference": "kernel-default-4.12.14-197.64.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.64.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.64.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.64.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.64.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.64.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.64.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.64.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-197.64.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.64.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.64.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.64.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.64.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.64.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.64.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.64.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-197.64.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.64.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.64.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-197.64.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.64.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-197.64.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.64.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.64.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.64.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.64.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.64.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.64.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.64.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.64.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.64.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.64.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.64.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.64.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.64.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.64.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-197.64.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.64.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.64.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.64.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.64.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.64.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.64.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.64.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.64.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.64.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.64.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.s390x" }, "product_reference": "kernel-syms-4.12.14-197.64.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.64.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.64.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.64.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.64.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.64.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.64.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.64.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.64.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.64.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.64.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.64.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-197.64.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.64.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-197.64.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.64.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.64.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.64.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.64.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_64-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_64-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_64-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_64-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.64.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.64.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.64.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.64.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.64.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.64.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.64.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.64.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.64.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-197.64.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.64.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-197.64.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.64.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-197.64.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.64.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-197.64.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.64.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.64.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.64.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-197.64.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.64.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-197.64.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.64.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.64.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.64.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.64.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.64.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.64.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.64.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.64.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.64.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.64.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-197.64.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.64.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-197.64.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.64.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.64.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.64.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-20T15:08:23Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.64.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.64.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.64.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-20T15:08:23Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.64.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.64.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.64.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.64.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.64.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-20T15:08:23Z", "details": "important" } ], "title": "CVE-2020-25645" } ] }
suse-su-2020:3449-1
Vulnerability from csaf_suse
Published
2020-11-19 16:20
Modified
2020-11-19 16:20
Summary
Security update for the Linux Kernel (Live Patch 16 for SLE 15)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 16 for SLE 15)
Description of the patch
This update for the Linux Kernel 4.12.14-150_41 fixes several issues.
The following security issues were fixed:
- CVE-2017-1000405: Fixed a bug in the THP CoW support that could have been used by local attackers to corrupt memory of other processes and cause them to crash (bsc#1178264, bsc#1069496, bsc#1070307).
- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bsc#1176723, bsc#1178003).
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724, bsc#1177729, bsc#1178397).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
Patchnames
SUSE-2020-3449,SUSE-SLE-Live-Patching-12-SP4-2020-3449,SUSE-SLE-Module-Live-Patching-15-2020-3440
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 16 for SLE 15)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-150_41 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-1000405: Fixed a bug in the THP CoW support that could have been used by local attackers to corrupt memory of other processes and cause them to crash (bsc#1178264, bsc#1069496, bsc#1070307).\n- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bsc#1176723, bsc#1178003).\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724, bsc#1177729, bsc#1178397).\n- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3449,SUSE-SLE-Live-Patching-12-SP4-2020-3449,SUSE-SLE-Module-Live-Patching-15-2020-3440", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3449-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3449-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203449-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3449-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007816.html" }, { "category": "self", "summary": "SUSE Bug 1177513", "url": "https://bugzilla.suse.com/1177513" }, { "category": "self", "summary": "SUSE Bug 1177729", "url": "https://bugzilla.suse.com/1177729" }, { "category": "self", "summary": "SUSE Bug 1178003", "url": "https://bugzilla.suse.com/1178003" }, { "category": "self", "summary": "SUSE Bug 1178264", "url": "https://bugzilla.suse.com/1178264" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000405 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000405/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0430 page", "url": "https://www.suse.com/security/cve/CVE-2020-0430/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" } ], "title": "Security update for the Linux Kernel (Live Patch 16 for SLE 15)", "tracking": { "current_release_date": "2020-11-19T16:20:50Z", "generator": { "date": "2020-11-19T16:20:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3449-1", "initial_release_date": "2020-11-19T16:20:50Z", "revision_history": [ { "date": "2020-11-19T16:20:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-1000405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000405" } ], "notes": [ { "category": "general", "text": "The Linux Kernel versions 2.6.38 through 4.14 have a problematic use of pmd_mkdirty() in the touch_pmd() function inside the THP implementation. touch_pmd() can be reached by get_user_pages(). In such case, the pmd will become dirty. This scenario breaks the new can_follow_write_pmd()\u0027s logic - pmd can become dirty without going through a COW cycle. This bug is not as severe as the original \"Dirty cow\" because an ext4 file (or any other regular file) cannot be mapped using THP. Nevertheless, it does allow us to overwrite read-only huge pages. For example, the zero huge page and sealed shmem files can be overwritten (since their mapping can be populated using THP). Note that after the first write page-fault to the zero page, it will be replaced with a new fresh (and zeroed) thp.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000405", "url": "https://www.suse.com/security/cve/CVE-2017-1000405" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2017-1000405", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1070307 for CVE-2017-1000405", "url": "https://bugzilla.suse.com/1070307" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-19T16:20:50Z", "details": "important" } ], "title": "CVE-2017-1000405" }, { "cve": "CVE-2020-0430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0430" } ], "notes": [ { "category": "general", "text": "In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0430", "url": "https://www.suse.com/security/cve/CVE-2020-0430" }, { "category": "external", "summary": "SUSE Bug 1176723 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1176723" }, { "category": "external", "summary": "SUSE Bug 1178003 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1178003" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-19T16:20:50Z", "details": "important" } ], "title": "CVE-2020-0430" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-19T16:20:50Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-19T16:20:50Z", "details": "important" } ], "title": "CVE-2020-25645" } ] }
suse-su-2020:3491-1
Vulnerability from csaf_suse
Published
2020-11-23 16:23
Modified
2020-11-23 16:23
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel Azure was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-16120: Fixed a permissions issue in ovl_path_open() (bsc#1177470).
- CVE-2020-12351: Implemented a kABI workaround for bluetooth l2cap_ops filter addition (bsc#1177724).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25212: Fixed a TOCTOU mismatch in the NFS client code (bnc#1176381).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)
- CVE-2020-27675: Fixed a race condition in event handler which may crash dom0 (XSA-331 bsc#1177410).
- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)
The following non-security bugs were fixed:
- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: Always build evged in (git-fixes).
- ACPI: button: fix handling lid state changes when input device closed (git-fixes).
- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).
- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).
- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).
- Add CONFIG_CHECK_CODESIGN_EKU
- airo: Fix read overflows sending packets (git-fixes).
- ALSA: ac97: (cosmetic) align argument names (git-fixes).
- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: asihpi: fix spellint typo in comments (git-fixes).
- ALSA: atmel: ac97: clarify operator precedence (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card->ctl_files_rwlock (git-fixes).
- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda: (cosmetic) align function parameters (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hdspm: Fix typo arbitary (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: portman2x4: fix repeated word 'if' (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: sparc: dbri: fix repeated word 'the' (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -> 'Frequency' (git-fixes).
- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).
- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).
- ALSA: vx: vx_core: clarify operator precedence (git-fixes).
- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).
- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).
- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ata: sata_rcar: Fix DMA boundary mask (git-fixes).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blk-mq: order adding requests to hctx->dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi->io_pages is always initialized (bsc#1177749).
- block: Fix page_is_mergeable() for compound pages (bsc#1177814).
- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).
- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).
- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).
- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: drop path before adding new uuid tree entry (bsc#1178176).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- btrfs: fix filesystem corruption after a device replace (bsc#1178395).
- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).
- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).
- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- btrfs: set the correct lockdep class for new nodes (bsc#1178184).
- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- ceph: promote to unsigned long long before shifting (bsc#1178175).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).
- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).
- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states are disabled (bnc#1176588).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ccp - fix error handling (git-fixes).
- crypto: dh - check validity of Z before export (bsc#1175718).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: ecdh - check validity of Z before export (bsc#1175718).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).
- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- dax: Fix compilation for CONFIG_DAX && !CONFIG_FS_DAX (bsc#1177817).
- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let's disable it at building out-of-tree codes
- Disable module compression on SLE15 SP2 (bsc#1178307)
- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).
- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).
- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).
- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).
- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).
- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).
- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).
- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).
- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).
- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).
- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).
- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).
- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).
- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).
- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).
- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).
- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).
- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).
- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).
- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).
- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).
- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).
- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).
- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).
- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).
- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).
- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).
- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).
- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).
- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).
- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).
- dm: Call proper helper to determine dax support (bsc#1177817).
- dm/dax: Fix table reference counts (bsc#1178246).
- docs: driver-api: remove a duplicated index entry (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).
- futex: Consistently use fshared as boolean (bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).
- futex: Remove put_futex_key() (bsc#1149032).
- futex: Remove unused or redundant includes (bsc#1149032).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: hid-input: fix stylus battery reporting (git-fixes).
- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).
- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- ibmvnic: save changed mac address to adapter->mac_addr (bsc#1134760 ltc#177449 git-fixes).
- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- ida: Free allocated bitmap in error path (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: stmfts - fix a & vs && typo (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: trackpoint - enable Synaptics trackpoints (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).
- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).
- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).
- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).
- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).
- ipvlan: fix device features (networking-stable-20_08_24).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kABI fix for NFS: Fix flexfiles read failover (git-fixes).
- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).
- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- leds: mt6323: move period calculation (git-fixes).
- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).
- libceph: clear con->out_msg on Policy::stateful_server faults (bsc#1178177).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- lib/mpi: Add mpi_sub_ui() (bsc#1175718).
- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: handle lack of sband->bitrates in rates (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).
- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).
- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm: do not panic when links can't be created in sysfs (bsc#1178002).
- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).
- mm: fix a race during THP splitting (bsc#1178255).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm: madvise: fix vma user-after-free (git-fixes).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm: replace memmap_context by meminit_context (bsc#1178002).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692). mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692).
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- module: Correctly truncate sysfs sections output (git-fixes).
- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).
- module: Refactor section attr into bin attribute (git-fixes).
- module: statically initialize init section freeing data (git-fixes).
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi->cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).
- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).
- mtd: spinand: gigadevice: Add QE Bit (git-fixes).
- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).
- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: dsa: b53: check for timeout (networking-stable-20_08_24).
- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).
- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).
- net: Fix bridge enslavement failure (networking-stable-20_09_24).
- net: Fix potential wrong skb->protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).
- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).
- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).
- net: lantiq: Wake TX queue again (networking-stable-20_09_24).
- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).
- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).
- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).
- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).
- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- nfp: use correct define to return NONE fec (networking-stable-20_09_24).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- NFS: ensure correct writeback errors are returned on close() (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- NFS: Fix security label length not being reset (bsc#1176381).
- NFS: nfs_file_write() should check for writeback errors (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- overflow: Include header file with SIZE_MAX declaration (git-fixes).
- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).
- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).
- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification.
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- pwm: img: Fix null pointer access in probe (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).
- r8169: fix operation under forced interrupt threading (git-fixes).
- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).
- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).
- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886) The in-tree KMP that is built with SLE kernels have a different scriptlet that is embedded in kernel-binary.spec.in rather than *.sh files.
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: rx8010: do not modify the global rtc ops (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- rtl8xxxu: prevent potential memory leak (git-fixes).
- rtw88: increse the size of rx buffer size (git-fixes).
- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).
- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Avoid creating large imbalances at task creation time (bnc#1176588).
- sched/numa: Check numa balancing information only when enabled (bnc#1176588).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- selftests/timers: Turn off timeout setting (git-fixes).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- slimbus: core: check get_addr before removing laddr ida (git-fixes).
- slimbus: core: do not enter to clock pause mode in core (git-fixes).
- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).
- soc: fsl: qbman: Fix return value on success (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc->setup() fails (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: spi-s3c64xx: Check return values (git-fixes).
- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).
- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).
- SUNRPC: Revert 241b1f419f0e ('SUNRPC: Remove xdr_buf_trim()') (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- taprio: Fix allowing too small intervals (networking-stable-20_09_24).
- target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).
- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).
- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).
- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).
- target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch: (bsc#1177090).
- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).
- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).
- target-rbd-support-COMPARE_AND_WRITE.patch: (bsc#1177090).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb->data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tracing: Check return value of __create_val_fields() before using its result (git-fixes).
- tracing: Save normal string variables (git-fixes).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- USB: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- USB: cdc-acm: handle broken union descriptors (git-fixes).
- USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- USB: core: Solve race condition in anchor cleanup functions (git-fixes).
- USB: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- USB: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- USB: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- USB: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- USB: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- USB: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).
- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).
- USB: dwc3: simple: add support for Hikey 970 (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- USB: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- USB: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- USB: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- usblp: fix race between disconnect() and read() (git-fixes).
- USB: ohci: Default to per-port over-current protection (git-fixes).
- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).
- USB: serial: option: add Cellient MPL200 card (git-fixes).
- USB: serial: option: Add Telit FT980-KS composition (git-fixes).
- USB: serial: pl2303: add device-id for HP GC device (git-fixes).
- USB: serial: qcserial: fix altsetting probing (git-fixes).
- USB: xhci-mtk: Fix typo (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).
- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).
- watchdog: Use put_device on error (git-fixes).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- whitespace cleanup
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode->i_io_list with inode->i_lock (bsc#1177755).
- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).
- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).
- x86/ioapic: Unbreak check_timer() (bsc#1152489).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).
- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xfs: fix high key handling in the rt allocator's query_range function (git-fixes).
- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).
- xfs: force the log after remapping a synchronous-writes file (git-fixes).
- xfs: limit entries returned when counting fsmap records (git-fixes).
- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).
- xprtrdma: fix incorrect header size calculations (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
Patchnames
SUSE-2020-3491,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3491
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP2 kernel Azure was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).\n- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).\n- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).\n- CVE-2020-16120: Fixed a permissions issue in ovl_path_open() (bsc#1177470).\n- CVE-2020-12351: Implemented a kABI workaround for bluetooth l2cap_ops filter addition (bsc#1177724).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 (bsc#1177725).\n- CVE-2020-25212: Fixed a TOCTOU mismatch in the NFS client code (bnc#1176381).\n- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).\n- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka \u0027BleedingTooth\u0027 aka \u0027BadVibes\u0027 (bsc#1177726).\n- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).\n- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).\n- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)\n- CVE-2020-27675: Fixed a race condition in event handler which may crash dom0 (XSA-331 bsc#1177410).\n- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix memory leak in v9fs_mount (git-fixes).\n- ACPI: Always build evged in (git-fixes).\n- ACPI: button: fix handling lid state changes when input device closed (git-fixes).\n- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).\n- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).\n- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).\n- ACPI: EC: Reference count query handlers under lock (git-fixes).\n- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).\n- Add CONFIG_CHECK_CODESIGN_EKU\n- airo: Fix read overflows sending packets (git-fixes).\n- ALSA: ac97: (cosmetic) align argument names (git-fixes).\n- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).\n- ALSA: asihpi: fix spellint typo in comments (git-fixes).\n- ALSA: atmel: ac97: clarify operator precedence (git-fixes).\n- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).\n- ALSA: compress_offload: remove redundant initialization (git-fixes).\n- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).\n- ALSA: core: pcm: simplify locking for timers (git-fixes).\n- ALSA: core: timer: clarify operator precedence (git-fixes).\n- ALSA: core: timer: remove redundant assignment (git-fixes).\n- ALSA: ctl: Workaround for lockdep warning wrt card-\u003ectl_files_rwlock (git-fixes).\n- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).\n- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).\n- ALSA: hda: (cosmetic) align function parameters (git-fixes).\n- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).\n- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).\n- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).\n- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).\n- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).\n- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).\n- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).\n- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).\n- ALSA: hdspm: Fix typo arbitary (git-fixes).\n- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).\n- ALSA: portman2x4: fix repeated word \u0027if\u0027 (git-fixes).\n- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).\n- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).\n- ALSA: sparc: dbri: fix repeated word \u0027the\u0027 (git-fixes).\n- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).\n- ALSA: usb-audio: endpoint.c: fix repeated word \u0027there\u0027 (git-fixes).\n- ALSA: usb-audio: fix spelling mistake \u0027Frequence\u0027 -\u003e \u0027Frequency\u0027 (git-fixes).\n- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).\n- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).\n- ALSA: vx: vx_core: clarify operator precedence (git-fixes).\n- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).\n- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).\n- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).\n- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).\n- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).\n- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).\n- ASoC: kirkwood: fix IRQ error handling (git-fixes).\n- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).\n- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).\n- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).\n- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).\n- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).\n- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).\n- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).\n- ata: sata_rcar: Fix DMA boundary mask (git-fixes).\n- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).\n- ath10k: fix array out-of-bounds access (git-fixes).\n- ath10k: fix memory leak for tpc_stats_final (git-fixes).\n- ath10k: Fix the size used in a \u0027dma_free_coherent()\u0027 call in an error handling path (git-fixes).\n- ath10k: provide survey info as accumulated data (git-fixes).\n- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).\n- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).\n- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).\n- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).\n- ath9k_htc: Use appropriate rs_datalen type (git-fixes).\n- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).\n- blk-mq: order adding requests to hctx-\u003edispatch and checking SCHED_RESTART (bsc#1177750).\n- block: ensure bdi-\u003eio_pages is always initialized (bsc#1177749).\n- block: Fix page_is_mergeable() for compound pages (bsc#1177814).\n- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).\n- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).\n- Bluetooth: Fix refcount use-after-free issue (git-fixes).\n- Bluetooth: guard against controllers sending zero\u0027d events (git-fixes).\n- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).\n- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).\n- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).\n- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).\n- Bluetooth: Only mark socket zapped after unlocking (git-fixes).\n- Bluetooth: prefetch channel before killing sock (git-fixes).\n- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).\n- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).\n- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).\n- brcmfmac: check ndev pointer (git-fixes).\n- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).\n- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).\n- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).\n- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).\n- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).\n- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).\n- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).\n- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).\n- btrfs: block-group: refactor how we read one block group item (bsc#1176019).\n- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).\n- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).\n- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).\n- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).\n- btrfs: do not take an extra root ref at allocation time (bsc#1176019).\n- btrfs: drop logs when we\u0027ve aborted a transaction (bsc#1176019).\n- btrfs: drop path before adding new uuid tree entry (bsc#1178176).\n- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).\n- btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).\n- btrfs: fix filesystem corruption after a device replace (bsc#1178395).\n- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).\n- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).\n- btrfs: fix race between page release and a fast fsync (bsc#1177687).\n- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).\n- btrfs: free block groups after free\u0027ing fs trees (bsc#1176019).\n- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).\n- btrfs: kill the subvol_srcu (bsc#1176019).\n- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).\n- btrfs: make inodes hold a ref on their roots (bsc#1176019).\n- btrfs: make the extent buffer leak check per fs info (bsc#1176019).\n- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).\n- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).\n- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).\n- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).\n- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).\n- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).\n- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).\n- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).\n- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).\n- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).\n- btrfs: release old extent maps during page release (bsc#1177687).\n- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).\n- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).\n- btrfs: rename member \u0027trimming\u0027 of block group to a more generic name (bsc#1176019).\n- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).\n- btrfs: set the correct lockdep class for new nodes (bsc#1178184).\n- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).\n- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).\n- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).\n- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).\n- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).\n- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).\n- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).\n- can: softing: softing_card_shutdown(): add braces around empty body in an \u0027if\u0027 statement (git-fixes).\n- ceph: promote to unsigned long long before shifting (bsc#1178175).\n- clk: at91: remove the checking of parent_name (git-fixes).\n- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).\n- clk: imx8mq: Fix usdhc parents order (git-fixes).\n- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).\n- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).\n- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).\n- clk: samsung: exynos4: mark \u0027chipid\u0027 clock as CLK_IGNORE_UNUSED (git-fixes).\n- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).\n- clk: tegra: Always program PLL_E when enabled (git-fixes).\n- clk/ti/adpll: allocate room for terminating null (git-fixes).\n- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).\n- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).\n- cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states are disabled (bnc#1176588).\n- create Storage / NVMe subsection\n- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).\n- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).\n- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).\n- crypto: ccp - fix error handling (git-fixes).\n- crypto: dh - check validity of Z before export (bsc#1175718).\n- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).\n- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).\n- crypto: ecdh - check validity of Z before export (bsc#1175718).\n- crypto: ixp4xx - Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).\n- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).\n- crypto: picoxcell - Fix potential race condition bug (git-fixes).\n- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).\n- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).\n- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).\n- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).\n- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).\n- dax: Fix compilation for CONFIG_DAX \u0026\u0026 !CONFIG_FS_DAX (bsc#1177817).\n- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let\u0027s disable it at building out-of-tree codes\n- Disable module compression on SLE15 SP2 (bsc#1178307)\n- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).\n- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).\n- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).\n- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).\n- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).\n- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).\n- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).\n- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).\n- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).\n- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).\n- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).\n- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).\n- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).\n- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).\n- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).\n- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: tegra-apb: Prevent race conditions on channel\u0027s freeing (git-fixes).\n- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).\n- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).\n- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).\n- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).\n- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).\n- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).\n- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).\n- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).\n- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).\n- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).\n- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).\n- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).\n- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).\n- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).\n- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).\n- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).\n- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).\n- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).\n- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).\n- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).\n- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).\n- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).\n- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).\n- dm: Call proper helper to determine dax support (bsc#1177817).\n- dm/dax: Fix table reference counts (bsc#1178246).\n- docs: driver-api: remove a duplicated index entry (git-fixes).\n- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).\n- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).\n- drm/radeon: revert \u0027Prefer lower feedback dividers\u0027 (bsc#1177384).\n- drop Storage / bsc#1171688 subsection No effect on expanded tree.\n- e1000: Do not perform reset in reset_task if we are already down (git-fixes).\n- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).\n- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).\n- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).\n- ftrace: Move RCU is watching check after recursion check (git-fixes).\n- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).\n- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).\n- futex: Consistently use fshared as boolean (bsc#1149032).\n- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).\n- futex: Remove put_futex_key() (bsc#1149032).\n- futex: Remove unused or redundant includes (bsc#1149032).\n- gpio: mockup: fix resource leak in error path (git-fixes).\n- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).\n- gpio: siox: explicitly support only threaded irqs (git-fixes).\n- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).\n- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).\n- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).\n- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).\n- HID: hid-input: fix stylus battery reporting (git-fixes).\n- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).\n- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).\n- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).\n- hwmon: (applesmc) check status earlier (git-fixes).\n- hwmon: (mlxreg-fan) Fix double \u0027Mellanox\u0027 (git-fixes).\n- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).\n- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).\n- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).\n- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).\n- i2c: cpm: Fix i2c_ram structure (git-fixes).\n- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).\n- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).\n- i2c: meson: fix clock setting overwrite (git-fixes).\n- i2c: meson: fixup rate calculation with filter delay (git-fixes).\n- i2c: owl: Clear NACK and BUS error bits (git-fixes).\n- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).\n- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).\n- i2c: tegra: Restore pinmux on system resume (git-fixes).\n- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).\n- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).\n- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).\n- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).\n- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).\n- ibmvnic: save changed mac address to adapter-\u003emac_addr (bsc#1134760 ltc#177449 git-fixes).\n- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).\n- icmp: randomize the global rate limiter (git-fixes).\n- ida: Free allocated bitmap in error path (git-fixes).\n- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).\n- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).\n- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).\n- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).\n- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).\n- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).\n- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).\n- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).\n- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).\n- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).\n- ima: extend boot_aggregate with kernel measurements (bsc#1177617).\n- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).\n- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).\n- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).\n- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).\n- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: stmfts - fix a \u0026 vs \u0026\u0026 typo (git-fixes).\n- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).\n- Input: trackpoint - enable Synaptics trackpoints (git-fixes).\n- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).\n- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).\n- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).\n- iommu/amd: Fix potential @entry null deref (bsc#1177283).\n- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).\n- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).\n- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).\n- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).\n- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).\n- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).\n- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).\n- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).\n- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).\n- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).\n- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).\n- ipvlan: fix device features (networking-stable-20_08_24).\n- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).\n- kABI fix for NFS: Fix flexfiles read failover (git-fixes).\n- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).\n- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.\n- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).\n- kbuild: enforce -Werror=return-type (bsc#1177281).\n- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).\n- leds: mlxreg: Fix possible buffer overflow (git-fixes).\n- leds: mt6323: move period calculation (git-fixes).\n- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).\n- libceph: clear con-\u003eout_msg on Policy::stateful_server faults (bsc#1178177).\n- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).\n- lib/mpi: Add mpi_sub_ui() (bsc#1175718).\n- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).\n- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).\n- mac80211: handle lack of sband-\u003ebitrates in rates (git-fixes).\n- mac80211: skip mpath lookup also for control port tx (git-fixes).\n- mac802154: tx: fix use-after-free (git-fixes).\n- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).\n- mailbox: avoid timer start from callback (git-fixes).\n- media: ati_remote: sanity check for both endpoints (git-fixes).\n- media: bdisp: Fix runtime PM imbalance on error (git-fixes).\n- media: camss: Fix a reference count leak (git-fixes).\n- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).\n- media: exynos4-is: Fix a reference count leak (git-fixes).\n- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).\n- media: firewire: fix memory leak (git-fixes).\n- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).\n- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).\n- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).\n- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).\n- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).\n- media: media/pci: prevent memory leak in bttv_probe (git-fixes).\n- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).\n- media: omap3isp: Fix memleak in isp_probe (git-fixes).\n- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).\n- media: platform: fcp: Fix a reference count leak (git-fixes).\n- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).\n- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).\n- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).\n- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).\n- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).\n- media: rcar-vin: Fix a reference count leak (git-fixes).\n- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).\n- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).\n- media: Revert \u0027media: exynos4-is: Add missed check for pinctrl_lookup_state()\u0027 (git-fixes).\n- media: rockchip/rga: Fix a reference count leak (git-fixes).\n- media: s5p-mfc: Fix a reference count leak (git-fixes).\n- media: saa7134: avoid a shift overflow (git-fixes).\n- media: smiapp: Fix error handling at NVM reading (git-fixes).\n- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).\n- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).\n- media: sti: Fix reference count leaks (git-fixes).\n- media: stm32-dcmi: Fix a reference count leak (git-fixes).\n- media: tc358743: cleanup tc358743_cec_isr (git-fixes).\n- media: tc358743: initialize variable (git-fixes).\n- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).\n- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).\n- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).\n- media: usbtv: Fix refcounting mixup (git-fixes).\n- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).\n- media: uvcvideo: Set media controller entity functions (git-fixes).\n- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).\n- media: v4l2-async: Document asd allocation requirements (git-fixes).\n- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).\n- media: vsp1: Fix runtime PM imbalance on error (git-fixes).\n- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).\n- memory: omap-gpmc: Fix a couple off by ones (git-fixes).\n- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).\n- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).\n- mfd: sm501: Fix leaks in probe() (git-fixes).\n- mic: vop: copy data to kernel space then write to io memory (git-fixes).\n- misc: mic: scif: Fix error handling path (git-fixes).\n- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).\n- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).\n- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).\n- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).\n- mmc: core: Rework wp-gpio handling (git-fixes).\n- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).\n- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).\n- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).\n- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).\n- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).\n- mm: do not panic when links can\u0027t be created in sysfs (bsc#1178002).\n- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).\n- mm: fix a race during THP splitting (bsc#1178255).\n- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).\n- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).\n- mm: madvise: fix vma user-after-free (git-fixes).\n- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).\n- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).\n- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).\n- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).\n- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).\n- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).\n- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).\n- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).\n- mm: replace memmap_context by meminit_context (bsc#1178002).\n- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).\n- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692). mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692). \n- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).\n- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).\n- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).\n- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).\n- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).\n- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).\n- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).\n- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).\n- module: Correctly truncate sysfs sections output (git-fixes).\n- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).\n- module: Refactor section attr into bin attribute (git-fixes).\n- module: statically initialize init section freeing data (git-fixes).\n- mt76: add missing locking around ampdu action (git-fixes).\n- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).\n- mt76: do not use devm API for led classdev (git-fixes).\n- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).\n- mt76: fix LED link time failure (git-fixes).\n- mtd: cfi_cmdset_0002: do not free cfi-\u003ecfiq in error path of cfi_amdstd_setup() (git-fixes).\n- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).\n- mtd: lpddr: fix excessive stack usage with clang (git-fixes).\n- mtd: mtdoops: Do not write panic data twice (git-fixes).\n- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).\n- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).\n- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).\n- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).\n- mtd: spinand: gigadevice: Add QE Bit (git-fixes).\n- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).\n- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).\n- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).\n- mwifiex: fix double free (git-fixes).\n- mwifiex: remove function pointer check (git-fixes).\n- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).\n- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).\n- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).\n- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).\n- net: disable netpoll on fresh napis (networking-stable-20_09_11).\n- net: dsa: b53: check for timeout (networking-stable-20_08_24).\n- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).\n- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).\n- net: Fix bridge enslavement failure (networking-stable-20_09_24).\n- net: Fix potential wrong skb-\u003eprotocol in skb_vlan_untag() (networking-stable-20_08_24).\n- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).\n- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).\n- netlabel: fix problems with mapping removal (networking-stable-20_09_11).\n- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).\n- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).\n- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).\n- net: lantiq: Wake TX queue again (networking-stable-20_09_24).\n- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).\n- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).\n- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).\n- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).\n- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).\n- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).\n- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).\n- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).\n- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).\n- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).\n- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).\n- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).\n- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).\n- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).\n- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).\n- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).\n- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).\n- nfp: use correct define to return NONE fec (networking-stable-20_09_24).\n- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).\n- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).\n- NFS: Do not return layout segments that are in use (git-fixes).\n- NFS: ensure correct writeback errors are returned on close() (git-fixes).\n- NFS: Fix flexfiles read failover (git-fixes).\n- NFS: Fix security label length not being reset (bsc#1176381).\n- NFS: nfs_file_write() should check for writeback errors (git-fixes).\n- NFSv4.2: fix client\u0027s attribute cache management for copy_file_range (git-fixes).\n- nl80211: fix non-split wiphy information (git-fixes).\n- NTB: hw: amd: fix an issue about leak system resources (git-fixes).\n- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).\n- nvme-multipath: retry commands for dying queues (bsc#1171688).\n- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).\n- nvme-rdma: fix crash when connect rejected (bsc#1174748).\n- overflow: Include header file with SIZE_MAX declaration (git-fixes).\n- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).\n- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).\n- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).\n- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).\n- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).\n- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).\n- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).\n- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).\n- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).\n- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).\n- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).\n- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).\n- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification.\n- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).\n- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).\n- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).\n- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).\n- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).\n- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).\n- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).\n- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).\n- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).\n- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).\n- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).\n- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).\n- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).\n- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).\n- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).\n- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).\n- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).\n- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).\n- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).\n- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).\n- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).\n- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).\n- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).\n- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).\n- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).\n- power: supply: max17040: Correct voltage reading (git-fixes).\n- pwm: img: Fix null pointer access in probe (git-fixes).\n- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).\n- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).\n- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).\n- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).\n- r8169: fix data corruption issue on RTL8402 (bsc#1174098).\n- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).\n- r8169: fix operation under forced interrupt threading (git-fixes).\n- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).\n- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).\n- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).\n- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).\n- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).\n- regulator: axp20x: fix LDO2/4 description (git-fixes).\n- regulator: resolve supply after creating regulator (git-fixes).\n- rename Other drivers / Intel IOMMU subsection to IOMMU\n- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).\n- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).\n- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886) The in-tree KMP that is built with SLE kernels have a different scriptlet that is embedded in kernel-binary.spec.in rather than *.sh files.\n- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)\n- rtc: ds1374: fix possible race condition (git-fixes).\n- rtc: rx8010: do not modify the global rtc ops (git-fixes).\n- rtc: sa1100: fix possible race condition (git-fixes).\n- rtl8xxxu: prevent potential memory leak (git-fixes).\n- rtw88: increse the size of rx buffer size (git-fixes).\n- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).\n- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).\n- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/numa: Avoid creating large imbalances at task creation time (bnc#1176588).\n- sched/numa: Check numa balancing information only when enabled (bnc#1176588).\n- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).\n- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).\n- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).\n- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).\n- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove unneeded variable \u0027rval\u0027 (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).\n- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).\n- selftests/timers: Turn off timeout setting (git-fixes).\n- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).\n- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).\n- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).\n- serial: uartps: Wait for tx_empty in console setup (git-fixes).\n- slimbus: core: check get_addr before removing laddr ida (git-fixes).\n- slimbus: core: do not enter to clock pause mode in core (git-fixes).\n- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).\n- soc: fsl: qbman: Fix return value on success (git-fixes).\n- spi: dw-pci: free previously allocated IRQs if desc-\u003esetup() fails (git-fixes).\n- spi: fsl-espi: Only process interrupts for expected events (git-fixes).\n- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).\n- spi: spi-s3c64xx: Check return values (git-fixes).\n- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).\n- spi: sprd: Release DMA channel also on probe deferral (git-fixes).\n- spi: stm32: Rate-limit the \u0027Communication suspended\u0027 message (git-fixes).\n- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).\n- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).\n- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).\n- SUNRPC: Revert 241b1f419f0e (\u0027SUNRPC: Remove xdr_buf_trim()\u0027) (git-fixes).\n- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).\n- taprio: Fix allowing too small intervals (networking-stable-20_09_24).\n- target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).\n- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).\n- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).\n- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).\n- target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch: (bsc#1177090).\n- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).\n- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).\n- target-rbd-support-COMPARE_AND_WRITE.patch: (bsc#1177090).\n- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).\n- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).\n- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).\n- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).\n- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).\n- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).\n- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).\n- tipc: fix uninit skb-\u003edata in tipc_nl_compat_dumpit() (networking-stable-20_08_24).\n- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).\n- tracing: Check return value of __create_val_fields() before using its result (git-fixes).\n- tracing: Save normal string variables (git-fixes).\n- tty: ipwireless: fix error handling (git-fixes).\n- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).\n- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).\n- USB: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).\n- USB: cdc-acm: handle broken union descriptors (git-fixes).\n- USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).\n- USB: core: Solve race condition in anchor cleanup functions (git-fixes).\n- USB: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).\n- USB: dwc2: Fix parameter type in function pointer prototype (git-fixes).\n- USB: dwc3: core: add phy cleanup for probe error handling (git-fixes).\n- USB: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).\n- USB: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).\n- USB: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).\n- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).\n- USB: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).\n- USB: dwc3: simple: add support for Hikey 970 (git-fixes).\n- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).\n- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).\n- USB: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).\n- USB: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).\n- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).\n- USB: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).\n- USB: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).\n- usblp: fix race between disconnect() and read() (git-fixes).\n- USB: ohci: Default to per-port over-current protection (git-fixes).\n- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).\n- USB: serial: option: add Cellient MPL200 card (git-fixes).\n- USB: serial: option: Add Telit FT980-KS composition (git-fixes).\n- USB: serial: pl2303: add device-id for HP GC device (git-fixes).\n- USB: serial: qcserial: fix altsetting probing (git-fixes).\n- USB: xhci-mtk: Fix typo (git-fixes).\n- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).\n- virtio-net: do not disable guest csum when disable LRO (git-fixes).\n- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).\n- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).\n- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).\n- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).\n- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).\n- watchdog: Use put_device on error (git-fixes).\n- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).\n- whitespace cleanup\n- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).\n- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).\n- writeback: Avoid skipping inode writeback (bsc#1177755).\n- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).\n- writeback: Protect inode-\u003ei_io_list with inode-\u003ei_lock (bsc#1177755). \n- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).\n- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).\n- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).\n- x86/ioapic: Unbreak check_timer() (bsc#1152489).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).\n- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).\n- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).\n- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).\n- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/events: add a new \u0027late EOI\u0027 evtchn framework (XSA-332 bsc#1177411).\n- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).\n- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).\n- xen/events: block rogue events for some time (XSA-332 bsc#1177411).\n- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).\n- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).\n- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).\n- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).\n- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).\n- xen/gntdev.c: Mark pages as dirty (bsc#1065600).\n- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xfs: fix high key handling in the rt allocator\u0027s query_range function (git-fixes).\n- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).\n- xfs: force the log after remapping a synchronous-writes file (git-fixes).\n- xfs: limit entries returned when counting fsmap records (git-fixes).\n- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n- yam: fix possible memory leak in yam_init_driver (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3491,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3491", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3491-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3491-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203491-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3491-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" }, { "category": "self", "summary": "SUSE Bug 1055014", "url": "https://bugzilla.suse.com/1055014" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1061843", "url": "https://bugzilla.suse.com/1061843" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066382", "url": "https://bugzilla.suse.com/1066382" }, { "category": "self", "summary": "SUSE Bug 1077428", "url": "https://bugzilla.suse.com/1077428" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 1134760", "url": "https://bugzilla.suse.com/1134760" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1163592", "url": "https://bugzilla.suse.com/1163592" }, { "category": "self", "summary": "SUSE Bug 1164648", "url": "https://bugzilla.suse.com/1164648" }, { "category": "self", "summary": "SUSE Bug 1165692", "url": "https://bugzilla.suse.com/1165692" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174098", "url": "https://bugzilla.suse.com/1174098" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1174969", "url": "https://bugzilla.suse.com/1174969" }, { "category": "self", "summary": "SUSE Bug 1175052", "url": "https://bugzilla.suse.com/1175052" }, { "category": "self", "summary": "SUSE Bug 1175599", "url": "https://bugzilla.suse.com/1175599" }, { "category": "self", "summary": "SUSE Bug 1175621", "url": "https://bugzilla.suse.com/1175621" }, { "category": "self", "summary": "SUSE Bug 1175718", "url": "https://bugzilla.suse.com/1175718" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175807", "url": "https://bugzilla.suse.com/1175807" }, { "category": "self", "summary": "SUSE Bug 1175898", "url": "https://bugzilla.suse.com/1175898" }, { "category": "self", "summary": "SUSE Bug 1176019", "url": "https://bugzilla.suse.com/1176019" }, { "category": "self", "summary": "SUSE Bug 1176354", "url": "https://bugzilla.suse.com/1176354" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176588", "url": "https://bugzilla.suse.com/1176588" }, { "category": "self", "summary": "SUSE Bug 1176713", "url": "https://bugzilla.suse.com/1176713" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176979", "url": "https://bugzilla.suse.com/1176979" }, { "category": "self", "summary": "SUSE Bug 1177027", "url": "https://bugzilla.suse.com/1177027" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177090", "url": "https://bugzilla.suse.com/1177090" }, { "category": "self", "summary": "SUSE Bug 1177109", "url": "https://bugzilla.suse.com/1177109" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177193", "url": "https://bugzilla.suse.com/1177193" }, { "category": "self", "summary": "SUSE Bug 1177194", "url": "https://bugzilla.suse.com/1177194" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177281", "url": "https://bugzilla.suse.com/1177281" }, { "category": "self", "summary": "SUSE Bug 1177283", "url": "https://bugzilla.suse.com/1177283" }, { "category": "self", "summary": "SUSE Bug 1177284", "url": "https://bugzilla.suse.com/1177284" }, { "category": "self", "summary": "SUSE Bug 1177285", "url": "https://bugzilla.suse.com/1177285" }, { "category": "self", "summary": "SUSE Bug 1177286", "url": "https://bugzilla.suse.com/1177286" }, { "category": "self", "summary": "SUSE Bug 1177297", "url": "https://bugzilla.suse.com/1177297" }, { "category": "self", "summary": "SUSE Bug 1177353", "url": "https://bugzilla.suse.com/1177353" }, { "category": "self", "summary": "SUSE Bug 1177384", "url": "https://bugzilla.suse.com/1177384" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177617", "url": "https://bugzilla.suse.com/1177617" }, { "category": "self", "summary": "SUSE Bug 1177681", "url": "https://bugzilla.suse.com/1177681" }, { "category": "self", "summary": "SUSE Bug 1177683", "url": "https://bugzilla.suse.com/1177683" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177694", "url": "https://bugzilla.suse.com/1177694" }, { "category": "self", "summary": "SUSE Bug 1177697", "url": "https://bugzilla.suse.com/1177697" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177726", "url": "https://bugzilla.suse.com/1177726" }, { "category": "self", "summary": "SUSE Bug 1177739", "url": "https://bugzilla.suse.com/1177739" }, { "category": "self", "summary": "SUSE Bug 1177749", "url": "https://bugzilla.suse.com/1177749" }, { "category": "self", "summary": "SUSE Bug 1177750", "url": "https://bugzilla.suse.com/1177750" }, { "category": "self", "summary": "SUSE Bug 1177754", "url": "https://bugzilla.suse.com/1177754" }, { "category": "self", "summary": "SUSE Bug 1177755", "url": "https://bugzilla.suse.com/1177755" }, { "category": "self", "summary": "SUSE Bug 1177765", "url": "https://bugzilla.suse.com/1177765" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177799", "url": "https://bugzilla.suse.com/1177799" }, { "category": "self", "summary": "SUSE Bug 1177801", "url": "https://bugzilla.suse.com/1177801" }, { "category": "self", "summary": "SUSE Bug 1177814", "url": "https://bugzilla.suse.com/1177814" }, { "category": "self", "summary": "SUSE Bug 1177817", "url": "https://bugzilla.suse.com/1177817" }, { "category": "self", "summary": "SUSE Bug 1177854", "url": "https://bugzilla.suse.com/1177854" }, { "category": "self", "summary": "SUSE Bug 1177855", "url": "https://bugzilla.suse.com/1177855" }, { "category": "self", "summary": "SUSE Bug 1177856", "url": "https://bugzilla.suse.com/1177856" }, { "category": "self", "summary": "SUSE Bug 1177861", "url": "https://bugzilla.suse.com/1177861" }, { "category": "self", "summary": "SUSE Bug 1178002", "url": "https://bugzilla.suse.com/1178002" }, { "category": "self", "summary": "SUSE Bug 1178079", "url": "https://bugzilla.suse.com/1178079" }, { "category": "self", "summary": "SUSE Bug 1178166", "url": "https://bugzilla.suse.com/1178166" }, { "category": "self", "summary": "SUSE Bug 1178173", "url": "https://bugzilla.suse.com/1178173" }, { "category": "self", "summary": "SUSE Bug 1178175", "url": "https://bugzilla.suse.com/1178175" }, { "category": "self", "summary": "SUSE Bug 1178176", "url": "https://bugzilla.suse.com/1178176" }, { "category": "self", "summary": "SUSE Bug 1178177", "url": "https://bugzilla.suse.com/1178177" }, { "category": "self", "summary": "SUSE Bug 1178183", "url": "https://bugzilla.suse.com/1178183" }, { "category": "self", "summary": "SUSE Bug 1178184", "url": "https://bugzilla.suse.com/1178184" }, { "category": "self", "summary": "SUSE Bug 1178185", "url": "https://bugzilla.suse.com/1178185" }, { "category": "self", "summary": "SUSE Bug 1178186", "url": "https://bugzilla.suse.com/1178186" }, { "category": "self", "summary": "SUSE Bug 1178190", "url": "https://bugzilla.suse.com/1178190" }, { "category": "self", "summary": "SUSE Bug 1178191", "url": "https://bugzilla.suse.com/1178191" }, { "category": "self", "summary": "SUSE Bug 1178246", "url": "https://bugzilla.suse.com/1178246" }, { "category": "self", "summary": "SUSE Bug 1178255", "url": "https://bugzilla.suse.com/1178255" }, { "category": "self", "summary": "SUSE Bug 1178307", "url": "https://bugzilla.suse.com/1178307" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178395", "url": "https://bugzilla.suse.com/1178395" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27673 page", "url": "https://www.suse.com/security/cve/CVE-2020-27673/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27675 page", "url": "https://www.suse.com/security/cve/CVE-2020-27675/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-11-23T16:23:08Z", "generator": { "date": "2020-11-23T16:23:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3491-1", "initial_release_date": "2020-11-23T16:23:08Z", "revision_history": [ { "date": "2020-11-23T16:23:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-5.3.18-18.24.1.noarch", "product": { "name": "kernel-devel-azure-5.3.18-18.24.1.noarch", "product_id": "kernel-devel-azure-5.3.18-18.24.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-5.3.18-18.24.1.noarch", "product": { "name": "kernel-source-azure-5.3.18-18.24.1.noarch", "product_id": "kernel-source-azure-5.3.18-18.24.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-5.3.18-18.24.1.x86_64", "product": { "name": "cluster-md-kmp-azure-5.3.18-18.24.1.x86_64", "product_id": "cluster-md-kmp-azure-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-5.3.18-18.24.1.x86_64", "product": { "name": "dlm-kmp-azure-5.3.18-18.24.1.x86_64", "product_id": "dlm-kmp-azure-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-5.3.18-18.24.1.x86_64", "product": { "name": "gfs2-kmp-azure-5.3.18-18.24.1.x86_64", "product_id": "gfs2-kmp-azure-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-5.3.18-18.24.1.x86_64", "product": { "name": "kernel-azure-5.3.18-18.24.1.x86_64", "product_id": "kernel-azure-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-5.3.18-18.24.1.x86_64", "product": { "name": "kernel-azure-devel-5.3.18-18.24.1.x86_64", "product_id": "kernel-azure-devel-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-5.3.18-18.24.1.x86_64", "product": { "name": "kernel-azure-extra-5.3.18-18.24.1.x86_64", "product_id": "kernel-azure-extra-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-5.3.18-18.24.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-5.3.18-18.24.1.x86_64", "product_id": "kernel-azure-livepatch-devel-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-5.3.18-18.24.1.x86_64", "product": { "name": "kernel-syms-azure-5.3.18-18.24.1.x86_64", "product_id": "kernel-syms-azure-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-5.3.18-18.24.1.x86_64", "product": { "name": "kselftests-kmp-azure-5.3.18-18.24.1.x86_64", "product_id": "kselftests-kmp-azure-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-5.3.18-18.24.1.x86_64", "product": { "name": "ocfs2-kmp-azure-5.3.18-18.24.1.x86_64", "product_id": "ocfs2-kmp-azure-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-5.3.18-18.24.1.x86_64", "product": { "name": "reiserfs-kmp-azure-5.3.18-18.24.1.x86_64", "product_id": "reiserfs-kmp-azure-5.3.18-18.24.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.3.18-18.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64" }, "product_reference": "kernel-azure-5.3.18-18.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.3.18-18.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64" }, "product_reference": "kernel-azure-devel-5.3.18-18.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-5.3.18-18.24.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch" }, "product_reference": "kernel-devel-azure-5.3.18-18.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-5.3.18-18.24.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch" }, "product_reference": "kernel-source-azure-5.3.18-18.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.3.18-18.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" }, "product_reference": "kernel-syms-azure-5.3.18-18.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "important" } ], "title": "CVE-2020-24490" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-27673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27673" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27673", "url": "https://www.suse.com/security/cve/CVE-2020-27673" }, { "category": "external", "summary": "SUSE Bug 1177411 for CVE-2020-27673", "url": "https://bugzilla.suse.com/1177411" }, { "category": "external", "summary": "SUSE Bug 1184583 for CVE-2020-27673", "url": "https://bugzilla.suse.com/1184583" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "moderate" } ], "title": "CVE-2020-27673" }, { "cve": "CVE-2020-27675", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27675" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27675", "url": "https://www.suse.com/security/cve/CVE-2020-27675" }, { "category": "external", "summary": "SUSE Bug 1177410 for CVE-2020-27675", "url": "https://bugzilla.suse.com/1177410" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "moderate" } ], "title": "CVE-2020-27675" } ] }
suse-su-2020:3402-1
Vulnerability from csaf_suse
Published
2020-11-19 10:44
Modified
2020-11-19 10:44
Summary
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2)
Description of the patch
This update for the Linux Kernel 5.3.18-24_12 fixes several issues.
The following security issues were fixed:
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724, bsc#1177729, bsc#1178397).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
Patchnames
SUSE-2020-3402,SUSE-SLE-Live-Patching-12-SP5-2020-3391,SUSE-SLE-Live-Patching-12-SP5-2020-3392,SUSE-SLE-Live-Patching-12-SP5-2020-3393,SUSE-SLE-Live-Patching-12-SP5-2020-3394,SUSE-SLE-Live-Patching-12-SP5-2020-3395,SUSE-SLE-Live-Patching-12-SP5-2020-3396,SUSE-SLE-Live-Patching-12-SP5-2020-3397,SUSE-SLE-Live-Patching-12-SP5-2020-3398,SUSE-SLE-Live-Patching-12-SP5-2020-3399,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3402,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3403,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3404,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3405,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3406,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3407,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3408,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3409,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3410,SUSE-SLE-Module-Live-Patching-15-SP2-2020-3386,SUSE-SLE-Module-Live-Patching-15-SP2-2020-3387,SUSE-SLE-Module-Live-Patching-15-SP2-2020-3388
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-24_12 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724, bsc#1177729, bsc#1178397).\n- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3402,SUSE-SLE-Live-Patching-12-SP5-2020-3391,SUSE-SLE-Live-Patching-12-SP5-2020-3392,SUSE-SLE-Live-Patching-12-SP5-2020-3393,SUSE-SLE-Live-Patching-12-SP5-2020-3394,SUSE-SLE-Live-Patching-12-SP5-2020-3395,SUSE-SLE-Live-Patching-12-SP5-2020-3396,SUSE-SLE-Live-Patching-12-SP5-2020-3397,SUSE-SLE-Live-Patching-12-SP5-2020-3398,SUSE-SLE-Live-Patching-12-SP5-2020-3399,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3402,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3403,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3404,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3405,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3406,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3407,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3408,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3409,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3410,SUSE-SLE-Module-Live-Patching-15-SP2-2020-3386,SUSE-SLE-Module-Live-Patching-15-SP2-2020-3387,SUSE-SLE-Module-Live-Patching-15-SP2-2020-3388", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3402-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3402-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203402-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3402-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007803.html" }, { "category": "self", "summary": "SUSE Bug 1177513", "url": "https://bugzilla.suse.com/1177513" }, { "category": "self", "summary": "SUSE Bug 1177729", "url": "https://bugzilla.suse.com/1177729" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" } ], "title": "Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2)", "tracking": { "current_release_date": "2020-11-19T10:44:43Z", "generator": { "date": "2020-11-19T10:44:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3402-1", "initial_release_date": "2020-11-19T10:44:43Z", "revision_history": [ { "date": "2020-11-19T10:44:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-19T10:44:43Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-19T10:44:43Z", "details": "important" } ], "title": "CVE-2020-25645" } ] }
suse-su-2020:3513-1
Vulnerability from csaf_suse
Published
2020-11-25 09:47
Modified
2020-11-25 09:47
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bug fixes.
The following security bugs were fixed:
- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-8694: Insufficient access control for some Intel(R) Processors may have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1170415).
- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bnc#1176723).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file (bsc#1177470).
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
The following non-security bugs were fixed:
- 9P: Cast to loff_t before multiplying (git-fixes).
- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).
- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).
- ACPI: dock: fix enum-conversion warning (git-fixes).
- ACPI / extlog: Check for RDMSR failure (git-fixes).
- ACPI: NFIT: Fix comparison to '-ENXIO' (git-fixes).
- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card->ctl_files_rwlock (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -> 'Frequency' (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ata: sata_rcar: Fix DMA boundary mask (git-fixes).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blacklist.conf: 11d6761218d1 mm, memcg: fix error return value of mem_cgroup_css_alloc()
- blk-mq: order adding requests to hctx->dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi->io_pages is always initialized (bsc#1177749).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- bnxt: do not enable NAPI until rings are ready (networking-stable-20_09_11).
- bnxt_en: Check for zero dir entries in NVRAM (networking-stable-20_09_11).
- bpf: Zero-fill re-used per-cpu map element (git-fixes).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: fix incorrect updating of log root tree (bsc#1177687).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: remove root usage from can_overcommit (bsc#1131277).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- btrfs: take overcommit into account in inc_block_group_ro (bsc#1176560).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).
- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).
- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).
- can: peak_usb: add range checking in decode operations (git-fixes).
- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).
- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- ceph: fix memory leak in ceph_cleanup_snapid_map() (bsc#1178234).
- ceph: map snapid to anonymous bdev ID (bsc#1178234).
- ceph: promote to unsigned long long before shifting (bsc#1178187).
- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- clk: ti: clockdomain: fix static checker warning (git-fixes).
- coredump: fix crash when umh is disabled (bsc#1177753).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ccp - fix error handling (git-fixes).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- device property: Do not clear secondary pointer for shared primary firmware node (git-fixes).
- device property: Keep secondary firmware node secondary by type (git-fixes).
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- drbd: code cleanup by using sendpage_ok() to check page for kernel_sendpage() (bsc#1172873).
- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).
- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).
- drm/amdgpu: do not map BO in reserved region (git-fixes).
- drm/amdgpu: prevent double kfree ttm->sg (git-fixes).
- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).
- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).
- drm/gma500: fix error check (git-fixes).
- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).
- drm/i915: Force VT'd workarounds when running as a guest OS (git-fixes).
- drm/imx: tve remove extraneous type qualifier (git-fixes).
- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/ttm: fix eviction valuable range check (git-fixes).
- drm/vc4: drv: Add error handding for bind (git-fixes).
- Drop sysctl files for dropped archs, add ppc64le and arm64 (bsc#1178838).
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1112178).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- efivarfs: Replace invalid slashes with exclamation marks in dentries (git-fixes).
- Fix use after free in get_capset_info callback (git-fixes).
- ftrace: Fix recursion check for NMI test (git-fixes).
- ftrace: Handle tracing when switching between context (git-fixes).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- hv_netvsc: Add XDP support (bsc#1177819, bsc#1177820).
- hv_netvsc: Fix XDP refcnt for synthetic and VF NICs (bsc#1177819, bsc#1177820).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- ibmvnic: save changed mac address to adapter->mac_addr (bsc#1134760 ltc#177449 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio:adc:max1118 Fix alignment of timestamp and data leak issues (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- include/linux/swapops.h: correct guards for non_swap_entry() (git-fixes (mm/swap)).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (git-fixes).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- kthread_worker: prevent queuing delayed work from timer_fn when it is being canceled (git-fixes).
- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).
- leds: mt6323: move period calculation (git-fixes).
- libceph: clear con->out_msg on Policy::stateful_server faults (bsc#1178188).
- libceph: use sendpage_ok() in ceph_tcp_sendpage() (bsc#1172873).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- mac80211: handle lack of sband->bitrates in rates (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: platform: Improve queue set up flow for bug fixing (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (bsc#1177703).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mlx5 PPC ringsize workaround (bsc#1173432).
- mlx5: remove support for ib_get_vector_affinity (bsc#1174748).
- mmc: sdhci-of-esdhc: Handle pulse width detection erratum for more SoCs (git-fixes).
- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm: hugetlb: switch to css_tryget() in hugetlb_cgroup_charge_cgroup() (git-fixes (mm/hugetlb)).
- mm/ksm.c: do not WARN if page is still mapped in remove_stable_node() (git-fixes (mm/hugetlb)).
- mm/memcg: fix refcount error while moving and swapping (bsc#1178686).
- mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm() (bsc#1177685).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/mempolicy.c: use match_string() helper to simplify the code (git-fixes (mm/mempolicy)).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (git-fixes (mm/numa)).
- mm/page_owner.c: remove drain_all_pages from init_early_allocated_pages (git-fixes (mm/debug)).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm/page-writeback.c: use div64_ul() for u64-by-unsigned-long divide (git-fixes (mm/writeback)).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm/zsmalloc.c: fix build when CONFIG_COMPACTION=n (git-fixes (mm/zsmalloc)).
- mm/zsmalloc.c: fix race condition in zs_destroy_pool (git-fixes (mm/zsmalloc)).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- mm/zsmalloc.c: migration can leave pages in ZS_EMPTY indefinitely (git-fixes (mm/zsmalloc)).
- Move the upstreamed bluetooth fix into sorted section
- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: add WARN_ONCE in kernel_sendpage() for improper zero-copy send (bsc#1172873).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).
- net: Fix potential wrong skb->protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: introduce helper sendpage_ok() in include/linux/net.h (bsc#1172873).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- net/mlx5e: Take common TIR context settings into a function (bsc#1177740).
- net/mlx5e: Turn on HW tunnel offload in all TIRs (bsc#1177740).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- nvme: do not update disk info for multipathed device (bsc#1171558).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- nvme-tcp: check page by sendpage_ok() before calling kernel_sendpage() (bsc#1172873).
- p54: avoid accessing the data mapped to streaming DMA (git-fixes).
- pinctrl: intel: Set default bias in case no particular value given (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries/cpuidle: add polling idle for shared processor guests (bsc#1178765 ltc#188968).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- powerpc/vnic: Extend 'failover pending' window (bsc#1176855 ltc#187293).
- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).
- pty: do tty_flip_buffer_push without port->lock in pty_write (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- ring-buffer: Fix recursion protection transitions between interrupt context (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtl8xxxu: prevent potential memory leak (git-fixes).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- scsi: libiscsi: use sendpage_ok() in iscsi_tcp_segment_map() (bsc#1172873).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).
- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).
- staging: octeon: repair 'fixed-link' support (git-fixes).
- tg3: Fix soft lockup when tg3_reset_task() fails (networking-stable-20_09_11).
- thunderbolt: Add the missed ida_simple_remove() in ring_request_msix() (git-fixes).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb->data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: earlycon dependency (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- USB: Add NO_LPM quirk for Kingston flash drive (git-fixes).
- USB: adutux: fix debugging (git-fixes).
- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- USB: cdc-acm: fix cooldown mechanism (git-fixes).
- usb: cdc-acm: handle broken union descriptors (git-fixes).
- usb: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- usb: core: Solve race condition in anchor cleanup functions (git-fixes).
- usb: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- usb: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- usb: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- usb: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- usb: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- usb: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- usb: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- USB: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).
- USB: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).
- usb: ohci: Default to per-port over-current protection (git-fixes).
- USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231 (git-fixes).
- USB: serial: option: add Quectel EC200T module support (git-fixes).
- USB: serial: option: add Telit FN980 composition 0x1055 (git-fixes).
- usb: serial: qcserial: fix altsetting probing (git-fixes).
- USB: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).
- USB: typec: tcpm: reset hard_reset_count for any disconnect (git-fixes).
- vfs: fix FIGETBSZ ioctl on an overlayfs file (bsc#1178202).
- video: fbdev: pvr2fb: initialize variables (git-fixes).
- video: fbdev: sis: fix null ptr dereference (git-fixes).
- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- vt: Disable KD_FONT_OP_COPY (bsc#1178589).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: iTCO_wdt: Export vendorsupport (bsc#1177101).
- watchdog: iTCO_wdt: Make ICH_RES_IO_SMI optional (bsc#1177101).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode->i_io_list with inode->i_lock (bsc#1177755).
- x86/apic: Unify duplicated local apic timer clockevent initialization (bsc#1112178).
- x86, fakenuma: Fix invalid starting node ID (git-fixes (mm/x86/fakenuma)).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1112178).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1058115 bsc#1176907).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
- xfs: avoid infinite loop when cancelling CoW blocks after writeback failure (bsc#1178027).
- xfs: do not update mtime on COW faults (bsc#1167030).
- xfs: fix a missing unlock on error in xfs_fs_map_blocks (git-fixes).
- xfs: fix flags argument to rmap lookup when converting shared file rmaps (git-fixes).
- xfs: fix rmap key and record comparison functions (git-fixes).
- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).
- xfs: limit entries returned when counting fsmap records (git-fixes).
Patchnames
SUSE-2020-3513,SUSE-SLE-Module-RT-15-SP1-2020-3513
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bug fixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).\n- CVE-2020-8694: Insufficient access control for some Intel(R) Processors may have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1170415).\n- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).\n- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).\n- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).\n- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).\n- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bnc#1176723).\n- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).\n- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file (bsc#1177470).\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 (bsc#1177725).\n\n\nThe following non-security bugs were fixed:\n\n- 9P: Cast to loff_t before multiplying (git-fixes).\n- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).\n- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).\n- ACPI: dock: fix enum-conversion warning (git-fixes).\n- ACPI / extlog: Check for RDMSR failure (git-fixes).\n- ACPI: NFIT: Fix comparison to \u0027-ENXIO\u0027 (git-fixes).\n- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).\n- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).\n- ALSA: compress_offload: remove redundant initialization (git-fixes).\n- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).\n- ALSA: core: pcm: simplify locking for timers (git-fixes).\n- ALSA: core: timer: clarify operator precedence (git-fixes).\n- ALSA: core: timer: remove redundant assignment (git-fixes).\n- ALSA: ctl: Workaround for lockdep warning wrt card-\u003ectl_files_rwlock (git-fixes).\n- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).\n- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).\n- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).\n- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).\n- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).\n- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).\n- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).\n- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).\n- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).\n- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).\n- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).\n- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).\n- ALSA: usb-audio: endpoint.c: fix repeated word \u0027there\u0027 (git-fixes).\n- ALSA: usb-audio: fix spelling mistake \u0027Frequence\u0027 -\u003e \u0027Frequency\u0027 (git-fixes).\n- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).\n- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).\n- ata: sata_rcar: Fix DMA boundary mask (git-fixes).\n- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).\n- ath10k: Fix the size used in a \u0027dma_free_coherent()\u0027 call in an error handling path (git-fixes).\n- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).\n- ath10k: provide survey info as accumulated data (git-fixes).\n- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).\n- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).\n- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).\n- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).\n- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).\n- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).\n- blacklist.conf: 11d6761218d1 mm, memcg: fix error return value of mem_cgroup_css_alloc()\n- blk-mq: order adding requests to hctx-\u003edispatch and checking SCHED_RESTART (bsc#1177750).\n- block: ensure bdi-\u003eio_pages is always initialized (bsc#1177749).\n- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).\n- Bluetooth: Only mark socket zapped after unlocking (git-fixes).\n- bnxt: do not enable NAPI until rings are ready (networking-stable-20_09_11).\n- bnxt_en: Check for zero dir entries in NVRAM (networking-stable-20_09_11).\n- bpf: Zero-fill re-used per-cpu map element (git-fixes).\n- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).\n- brcmfmac: check ndev pointer (git-fixes).\n- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).\n- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).\n- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).\n- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).\n- btrfs: fix incorrect updating of log root tree (bsc#1177687).\n- btrfs: fix race between page release and a fast fsync (bsc#1177687).\n- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).\n- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).\n- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).\n- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).\n- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).\n- btrfs: release old extent maps during page release (bsc#1177687).\n- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).\n- btrfs: remove root usage from can_overcommit (bsc#1131277).\n- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).\n- btrfs: take overcommit into account in inc_block_group_ro (bsc#1176560).\n- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).\n- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).\n- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).\n- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).\n- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).\n- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).\n- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).\n- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).\n- can: peak_usb: add range checking in decode operations (git-fixes).\n- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).\n- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).\n- can: softing: softing_card_shutdown(): add braces around empty body in an \u0027if\u0027 statement (git-fixes).\n- ceph: fix memory leak in ceph_cleanup_snapid_map() (bsc#1178234).\n- ceph: map snapid to anonymous bdev ID (bsc#1178234).\n- ceph: promote to unsigned long long before shifting (bsc#1178187).\n- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).\n- clk: at91: remove the checking of parent_name (git-fixes).\n- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).\n- clk: imx8mq: Fix usdhc parents order (git-fixes).\n- clk: ti: clockdomain: fix static checker warning (git-fixes).\n- coredump: fix crash when umh is disabled (bsc#1177753).\n- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).\n- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).\n- crypto: ccp - fix error handling (git-fixes).\n- crypto: ixp4xx - Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).\n- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).\n- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).\n- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).\n- device property: Do not clear secondary pointer for shared primary firmware node (git-fixes).\n- device property: Keep secondary firmware node secondary by type (git-fixes).\n- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).\n- drbd: code cleanup by using sendpage_ok() to check page for kernel_sendpage() (bsc#1172873).\n- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).\n- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).\n- drm/amdgpu: do not map BO in reserved region (git-fixes).\n- drm/amdgpu: prevent double kfree ttm-\u003esg (git-fixes).\n- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).\n- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).\n- drm/gma500: fix error check (git-fixes).\n- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).\n- drm/i915: Force VT\u0027d workarounds when running as a guest OS (git-fixes).\n- drm/imx: tve remove extraneous type qualifier (git-fixes).\n- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (git-fixes).\n- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).\n- drm/ttm: fix eviction valuable range check (git-fixes).\n- drm/vc4: drv: Add error handding for bind (git-fixes).\n- Drop sysctl files for dropped archs, add ppc64le and arm64 (bsc#1178838).\n- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1112178).\n- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).\n- efivarfs: Replace invalid slashes with exclamation marks in dentries (git-fixes).\n- Fix use after free in get_capset_info callback (git-fixes).\n- ftrace: Fix recursion check for NMI test (git-fixes).\n- ftrace: Handle tracing when switching between context (git-fixes).\n- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).\n- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).\n- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).\n- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).\n- hv_netvsc: Add XDP support (bsc#1177819, bsc#1177820).\n- hv_netvsc: Fix XDP refcnt for synthetic and VF NICs (bsc#1177819, bsc#1177820).\n- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).\n- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).\n- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).\n- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).\n- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).\n- ibmvnic: save changed mac address to adapter-\u003emac_addr (bsc#1134760 ltc#177449 git-fixes).\n- icmp: randomize the global rate limiter (git-fixes).\n- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).\n- iio:adc:max1118 Fix alignment of timestamp and data leak issues (git-fixes).\n- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).\n- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).\n- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).\n- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).\n- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).\n- include/linux/swapops.h: correct guards for non_swap_entry() (git-fixes (mm/swap)).\n- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (git-fixes).\n- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).\n- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).\n- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).\n- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).\n- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).\n- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).\n- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).\n- kbuild: enforce -Werror=return-type (bsc#1177281).\n- kthread_worker: prevent queuing delayed work from timer_fn when it is being canceled (git-fixes).\n- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).\n- leds: mt6323: move period calculation (git-fixes).\n- libceph: clear con-\u003eout_msg on Policy::stateful_server faults (bsc#1178188).\n- libceph: use sendpage_ok() in ceph_tcp_sendpage() (bsc#1172873).\n- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).\n- mac80211: handle lack of sband-\u003ebitrates in rates (git-fixes).\n- mailbox: avoid timer start from callback (git-fixes).\n- media: ati_remote: sanity check for both endpoints (git-fixes).\n- media: bdisp: Fix runtime PM imbalance on error (git-fixes).\n- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).\n- media: exynos4-is: Fix a reference count leak (git-fixes).\n- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).\n- media: firewire: fix memory leak (git-fixes).\n- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).\n- media: media/pci: prevent memory leak in bttv_probe (git-fixes).\n- media: omap3isp: Fix memleak in isp_probe (git-fixes).\n- media: platform: fcp: Fix a reference count leak (git-fixes).\n- media: platform: Improve queue set up flow for bug fixing (git-fixes).\n- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).\n- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).\n- media: Revert \u0027media: exynos4-is: Add missed check for pinctrl_lookup_state()\u0027 (git-fixes).\n- media: s5p-mfc: Fix a reference count leak (git-fixes).\n- media: saa7134: avoid a shift overflow (git-fixes).\n- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).\n- media: sti: Fix reference count leaks (git-fixes).\n- media: tc358743: initialize variable (git-fixes).\n- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).\n- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).\n- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).\n- media: usbtv: Fix refcounting mixup (git-fixes).\n- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).\n- media: vsp1: Fix runtime PM imbalance on error (git-fixes).\n- memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (bsc#1177703).\n- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).\n- memory: omap-gpmc: Fix a couple off by ones (git-fixes).\n- mfd: sm501: Fix leaks in probe() (git-fixes).\n- mic: vop: copy data to kernel space then write to io memory (git-fixes).\n- misc: mic: scif: Fix error handling path (git-fixes).\n- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).\n- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).\n- mlx5 PPC ringsize workaround (bsc#1173432).\n- mlx5: remove support for ib_get_vector_affinity (bsc#1174748).\n- mmc: sdhci-of-esdhc: Handle pulse width detection erratum for more SoCs (git-fixes).\n- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).\n- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).\n- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).\n- mm: hugetlb: switch to css_tryget() in hugetlb_cgroup_charge_cgroup() (git-fixes (mm/hugetlb)).\n- mm/ksm.c: do not WARN if page is still mapped in remove_stable_node() (git-fixes (mm/hugetlb)).\n- mm/memcg: fix refcount error while moving and swapping (bsc#1178686).\n- mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm() (bsc#1177685).\n- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).\n- mm/mempolicy.c: use match_string() helper to simplify the code (git-fixes (mm/mempolicy)).\n- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (git-fixes (mm/numa)).\n- mm/page_owner.c: remove drain_all_pages from init_early_allocated_pages (git-fixes (mm/debug)).\n- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).\n- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).\n- mm/page-writeback.c: use div64_ul() for u64-by-unsigned-long divide (git-fixes (mm/writeback)).\n- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).\n- mm/zsmalloc.c: fix build when CONFIG_COMPACTION=n (git-fixes (mm/zsmalloc)).\n- mm/zsmalloc.c: fix race condition in zs_destroy_pool (git-fixes (mm/zsmalloc)).\n- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).\n- mm/zsmalloc.c: migration can leave pages in ZS_EMPTY indefinitely (git-fixes (mm/zsmalloc)).\n- Move the upstreamed bluetooth fix into sorted section\n- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).\n- mtd: lpddr: fix excessive stack usage with clang (git-fixes).\n- mtd: mtdoops: Do not write panic data twice (git-fixes).\n- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).\n- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).\n- mwifiex: fix double free (git-fixes).\n- mwifiex: remove function pointer check (git-fixes).\n- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).\n- net: add WARN_ONCE in kernel_sendpage() for improper zero-copy send (bsc#1172873).\n- net: disable netpoll on fresh napis (networking-stable-20_09_11).\n- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).\n- net: Fix potential wrong skb-\u003eprotocol in skb_vlan_untag() (networking-stable-20_08_24).\n- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).\n- net: introduce helper sendpage_ok() in include/linux/net.h (bsc#1172873).\n- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).\n- netlabel: fix problems with mapping removal (networking-stable-20_09_11).\n- net/mlx5e: Take common TIR context settings into a function (bsc#1177740).\n- net/mlx5e: Turn on HW tunnel offload in all TIRs (bsc#1177740).\n- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).\n- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).\n- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).\n- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).\n- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).\n- net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition (git-fixes).\n- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).\n- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).\n- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).\n- nl80211: fix non-split wiphy information (git-fixes).\n- NTB: hw: amd: fix an issue about leak system resources (git-fixes).\n- nvme: do not update disk info for multipathed device (bsc#1171558). \n- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).\n- nvme-rdma: fix crash when connect rejected (bsc#1174748).\n- nvme-tcp: check page by sendpage_ok() before calling kernel_sendpage() (bsc#1172873).\n- p54: avoid accessing the data mapped to streaming DMA (git-fixes).\n- pinctrl: intel: Set default bias in case no particular value given (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).\n- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).\n- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).\n- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).\n- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).\n- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).\n- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).\n- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).\n- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).\n- powerpc/pseries/cpuidle: add polling idle for shared processor guests (bsc#1178765 ltc#188968).\n- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).\n- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).\n- powerpc/vnic: Extend \u0027failover pending\u0027 window (bsc#1176855 ltc#187293).\n- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).\n- pty: do tty_flip_buffer_push without port-\u003elock in pty_write (git-fixes).\n- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).\n- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).\n- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).\n- regulator: resolve supply after creating regulator (git-fixes).\n- ring-buffer: Fix recursion protection transitions between interrupt context (git-fixes).\n- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).\n- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)\n- rtl8xxxu: prevent potential memory leak (git-fixes).\n- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).\n- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).\n- scsi: libiscsi: use sendpage_ok() in iscsi_tcp_segment_map() (bsc#1172873).\n- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).\n- spi: fsl-espi: Only process interrupts for expected events (git-fixes).\n- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).\n- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).\n- staging: octeon: repair \u0027fixed-link\u0027 support (git-fixes).\n- tg3: Fix soft lockup when tg3_reset_task() fails (networking-stable-20_09_11).\n- thunderbolt: Add the missed ida_simple_remove() in ring_request_msix() (git-fixes).\n- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).\n- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).\n- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).\n- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).\n- tipc: fix uninit skb-\u003edata in tipc_nl_compat_dumpit() (networking-stable-20_08_24).\n- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).\n- tty: ipwireless: fix error handling (git-fixes).\n- tty: serial: earlycon dependency (git-fixes).\n- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).\n- USB: Add NO_LPM quirk for Kingston flash drive (git-fixes).\n- USB: adutux: fix debugging (git-fixes).\n- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).\n- USB: cdc-acm: fix cooldown mechanism (git-fixes).\n- usb: cdc-acm: handle broken union descriptors (git-fixes).\n- usb: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).\n- usb: core: Solve race condition in anchor cleanup functions (git-fixes).\n- usb: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).\n- usb: dwc2: Fix parameter type in function pointer prototype (git-fixes).\n- usb: dwc3: core: add phy cleanup for probe error handling (git-fixes).\n- usb: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).\n- usb: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).\n- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).\n- usb: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).\n- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).\n- usb: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).\n- USB: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).\n- USB: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).\n- usb: ohci: Default to per-port over-current protection (git-fixes).\n- USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231 (git-fixes).\n- USB: serial: option: add Quectel EC200T module support (git-fixes).\n- USB: serial: option: add Telit FN980 composition 0x1055 (git-fixes).\n- usb: serial: qcserial: fix altsetting probing (git-fixes).\n- USB: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).\n- USB: typec: tcpm: reset hard_reset_count for any disconnect (git-fixes).\n- vfs: fix FIGETBSZ ioctl on an overlayfs file (bsc#1178202).\n- video: fbdev: pvr2fb: initialize variables (git-fixes).\n- video: fbdev: sis: fix null ptr dereference (git-fixes).\n- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).\n- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).\n- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).\n- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).\n- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).\n- vt: Disable KD_FONT_OP_COPY (bsc#1178589).\n- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).\n- watchdog: iTCO_wdt: Export vendorsupport (bsc#1177101).\n- watchdog: iTCO_wdt: Make ICH_RES_IO_SMI optional (bsc#1177101).\n- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).\n- writeback: Avoid skipping inode writeback (bsc#1177755).\n- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).\n- writeback: Protect inode-\u003ei_io_list with inode-\u003ei_lock (bsc#1177755).\n- x86/apic: Unify duplicated local apic timer clockevent initialization (bsc#1112178).\n- x86, fakenuma: Fix invalid starting node ID (git-fixes (mm/x86/fakenuma)).\n- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1112178).\n- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).\n- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1058115 bsc#1176907).\n- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).\n- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/events: add a new \u0027late EOI\u0027 evtchn framework (XSA-332 bsc#1177411).\n- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).\n- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).\n- xen/events: block rogue events for some time (XSA-332 bsc#1177411).\n- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).\n- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).\n- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).\n- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).\n- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).\n- xen/gntdev.c: Mark pages as dirty (bsc#1065600).\n- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).\n- xfs: avoid infinite loop when cancelling CoW blocks after writeback failure (bsc#1178027).\n- xfs: do not update mtime on COW faults (bsc#1167030).\n- xfs: fix a missing unlock on error in xfs_fs_map_blocks (git-fixes).\n- xfs: fix flags argument to rmap lookup when converting shared file rmaps (git-fixes).\n- xfs: fix rmap key and record comparison functions (git-fixes).\n- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).\n- xfs: limit entries returned when counting fsmap records (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3513,SUSE-SLE-Module-RT-15-SP1-2020-3513", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3513-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3513-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203513-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3513-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" }, { "category": "self", "summary": "SUSE Bug 1055014", "url": "https://bugzilla.suse.com/1055014" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1061843", "url": "https://bugzilla.suse.com/1061843" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066382", "url": "https://bugzilla.suse.com/1066382" }, { "category": "self", "summary": "SUSE Bug 1077428", "url": "https://bugzilla.suse.com/1077428" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1131277", "url": "https://bugzilla.suse.com/1131277" }, { "category": "self", "summary": "SUSE Bug 1134760", "url": "https://bugzilla.suse.com/1134760" }, { "category": "self", "summary": "SUSE Bug 1163592", "url": "https://bugzilla.suse.com/1163592" }, { "category": "self", "summary": "SUSE Bug 1167030", "url": "https://bugzilla.suse.com/1167030" }, { "category": "self", "summary": "SUSE Bug 1170415", "url": "https://bugzilla.suse.com/1170415" }, { "category": "self", "summary": "SUSE Bug 1170446", "url": "https://bugzilla.suse.com/1170446" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1172873", "url": "https://bugzilla.suse.com/1172873" }, { "category": "self", "summary": "SUSE Bug 1173432", "url": "https://bugzilla.suse.com/1173432" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1175306", "url": "https://bugzilla.suse.com/1175306" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1176354", "url": "https://bugzilla.suse.com/1176354" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176560", "url": "https://bugzilla.suse.com/1176560" }, { "category": "self", "summary": "SUSE Bug 1176713", "url": "https://bugzilla.suse.com/1176713" }, { "category": "self", "summary": "SUSE Bug 1176723", "url": "https://bugzilla.suse.com/1176723" }, { "category": "self", "summary": "SUSE Bug 1176855", "url": "https://bugzilla.suse.com/1176855" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176983", "url": "https://bugzilla.suse.com/1176983" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177101", "url": "https://bugzilla.suse.com/1177101" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177281", "url": "https://bugzilla.suse.com/1177281" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177685", "url": "https://bugzilla.suse.com/1177685" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177703", "url": "https://bugzilla.suse.com/1177703" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177740", "url": "https://bugzilla.suse.com/1177740" }, { "category": "self", "summary": "SUSE Bug 1177749", "url": "https://bugzilla.suse.com/1177749" }, { "category": "self", "summary": "SUSE Bug 1177750", "url": "https://bugzilla.suse.com/1177750" }, { "category": "self", "summary": "SUSE Bug 1177753", "url": "https://bugzilla.suse.com/1177753" }, { "category": "self", "summary": "SUSE Bug 1177754", "url": "https://bugzilla.suse.com/1177754" }, { "category": "self", "summary": "SUSE Bug 1177755", "url": "https://bugzilla.suse.com/1177755" }, { "category": "self", "summary": "SUSE Bug 1177762", "url": "https://bugzilla.suse.com/1177762" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177819", "url": "https://bugzilla.suse.com/1177819" }, { "category": "self", "summary": "SUSE Bug 1177820", "url": "https://bugzilla.suse.com/1177820" }, { "category": "self", "summary": "SUSE Bug 1177855", "url": "https://bugzilla.suse.com/1177855" }, { "category": "self", "summary": "SUSE Bug 1177856", "url": "https://bugzilla.suse.com/1177856" }, { "category": "self", "summary": "SUSE Bug 1177861", "url": "https://bugzilla.suse.com/1177861" }, { "category": "self", "summary": "SUSE Bug 1178003", "url": "https://bugzilla.suse.com/1178003" }, { "category": "self", "summary": "SUSE Bug 1178027", "url": "https://bugzilla.suse.com/1178027" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178166", "url": "https://bugzilla.suse.com/1178166" }, { "category": "self", "summary": "SUSE Bug 1178185", "url": "https://bugzilla.suse.com/1178185" }, { "category": "self", "summary": "SUSE Bug 1178187", "url": "https://bugzilla.suse.com/1178187" }, { "category": "self", "summary": "SUSE Bug 1178188", "url": "https://bugzilla.suse.com/1178188" }, { "category": "self", "summary": "SUSE Bug 1178202", "url": "https://bugzilla.suse.com/1178202" }, { "category": "self", "summary": "SUSE Bug 1178234", "url": "https://bugzilla.suse.com/1178234" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178393", "url": "https://bugzilla.suse.com/1178393" }, { "category": "self", "summary": "SUSE Bug 1178589", "url": "https://bugzilla.suse.com/1178589" }, { "category": "self", "summary": "SUSE Bug 1178591", "url": "https://bugzilla.suse.com/1178591" }, { "category": "self", "summary": "SUSE Bug 1178622", "url": "https://bugzilla.suse.com/1178622" }, { "category": "self", "summary": "SUSE Bug 1178686", "url": "https://bugzilla.suse.com/1178686" }, { "category": "self", "summary": "SUSE Bug 1178765", "url": "https://bugzilla.suse.com/1178765" }, { "category": "self", "summary": "SUSE Bug 1178782", "url": "https://bugzilla.suse.com/1178782" }, { "category": "self", "summary": "SUSE Bug 1178838", "url": "https://bugzilla.suse.com/1178838" }, { "category": "self", "summary": "SUSE Bug 927455", "url": "https://bugzilla.suse.com/927455" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0430 page", "url": "https://www.suse.com/security/cve/CVE-2020-0430/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25704 page", "url": "https://www.suse.com/security/cve/CVE-2020-25704/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-11-25T09:47:02Z", "generator": { "date": "2020-11-25T09:47:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3513-1", "initial_release_date": "2020-11-25T09:47:02Z", "revision_history": [ { "date": "2020-11-25T09:47:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-14.41.2.noarch", "product": { "name": "kernel-devel-rt-4.12.14-14.41.2.noarch", "product_id": "kernel-devel-rt-4.12.14-14.41.2.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-14.41.2.noarch", "product": { "name": "kernel-source-rt-4.12.14-14.41.2.noarch", "product_id": "kernel-source-rt-4.12.14-14.41.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-4.12.14-14.41.2.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-4.12.14-14.41.2.x86_64", "product_id": "cluster-md-kmp-rt_debug-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-14.41.2.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-14.41.2.x86_64", "product_id": "dlm-kmp-rt-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-4.12.14-14.41.2.x86_64", "product": { "name": "dlm-kmp-rt_debug-4.12.14-14.41.2.x86_64", "product_id": "dlm-kmp-rt_debug-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-4.12.14-14.41.2.x86_64", "product": { "name": "gfs2-kmp-rt_debug-4.12.14-14.41.2.x86_64", "product_id": "gfs2-kmp-rt_debug-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-14.41.2.x86_64", "product": { "name": "kernel-rt-4.12.14-14.41.2.x86_64", "product_id": "kernel-rt-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-14.41.2.x86_64", "product": { "name": "kernel-rt-base-4.12.14-14.41.2.x86_64", "product_id": "kernel-rt-base-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-14.41.2.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-14.41.2.x86_64", "product_id": "kernel-rt-devel-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-4.12.14-14.41.2.x86_64", "product": { "name": "kernel-rt-extra-4.12.14-14.41.2.x86_64", "product_id": "kernel-rt-extra-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-4.12.14-14.41.2.x86_64", "product": { "name": "kernel-rt-livepatch-devel-4.12.14-14.41.2.x86_64", "product_id": "kernel-rt-livepatch-devel-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-14.41.2.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-14.41.2.x86_64", "product_id": "kernel-rt_debug-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-base-4.12.14-14.41.2.x86_64", "product": { "name": "kernel-rt_debug-base-4.12.14-14.41.2.x86_64", "product_id": "kernel-rt_debug-base-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-4.12.14-14.41.2.x86_64", "product": { "name": "kernel-rt_debug-extra-4.12.14-14.41.2.x86_64", "product_id": "kernel-rt_debug-extra-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.41.2.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.41.2.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-14.41.2.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-14.41.2.x86_64", "product_id": "kernel-syms-rt-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-4.12.14-14.41.2.x86_64", "product": { "name": "kselftests-kmp-rt-4.12.14-14.41.2.x86_64", "product_id": "kselftests-kmp-rt-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-4.12.14-14.41.2.x86_64", "product": { "name": "kselftests-kmp-rt_debug-4.12.14-14.41.2.x86_64", "product_id": "kselftests-kmp-rt_debug-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-14.41.2.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-14.41.2.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-4.12.14-14.41.2.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-4.12.14-14.41.2.x86_64", "product_id": "ocfs2-kmp-rt_debug-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-4.12.14-14.41.2.x86_64", "product": { "name": "reiserfs-kmp-rt-4.12.14-14.41.2.x86_64", "product_id": "reiserfs-kmp-rt-4.12.14-14.41.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-4.12.14-14.41.2.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-4.12.14-14.41.2.x86_64", "product_id": "reiserfs-kmp-rt_debug-4.12.14-14.41.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Real Time Module 15 SP1", "product": { "name": "SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-14.41.2.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-14.41.2.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-14.41.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-14.41.2.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-14.41.2.noarch as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-14.41.2.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-14.41.2.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64" }, "product_reference": "kernel-rt-4.12.14-14.41.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-14.41.2.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-14.41.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-14.41.2.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-14.41.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-14.41.2.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-14.41.2.noarch as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch" }, "product_reference": "kernel-source-rt-4.12.14-14.41.2.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-14.41.2.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-14.41.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-14.41.2.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-14.41.2.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0430" } ], "notes": [ { "category": "general", "text": "In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0430", "url": "https://www.suse.com/security/cve/CVE-2020-0430" }, { "category": "external", "summary": "SUSE Bug 1176723 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1176723" }, { "category": "external", "summary": "SUSE Bug 1178003 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1178003" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:47:02Z", "details": "important" } ], "title": "CVE-2020-0430" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:47:02Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:47:02Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:47:02Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:47:02Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:47:02Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:47:02Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:47:02Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25704" } ], "notes": [ { "category": "general", "text": "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25704", "url": "https://www.suse.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "SUSE Bug 1178393 for CVE-2020-25704", "url": "https://bugzilla.suse.com/1178393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:47:02Z", "details": "moderate" } ], "title": "CVE-2020-25704" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:47:02Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.41.2.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.41.2.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:47:02Z", "details": "moderate" } ], "title": "CVE-2020-8694" } ] }
suse-su-2020:3281-1
Vulnerability from csaf_suse
Published
2020-11-14 08:18
Modified
2020-11-14 08:18
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel Azure was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bnc#1176723).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-16120: Fixed a permissions issue in ovl_path_open() (bsc#1177470).
- CVE-2020-12351: Implemented a kABI workaround for bluetooth l2cap_ops filter addition (bsc#1177724).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25212: Fixed a TOCTOU mismatch in the NFS client code (bnc#1176381).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).
- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)
- CVE-2020-27675: Fixed a race condition in event handler which may crash dom0 (XSA-331 bsc#1177410).
- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)
The following non-security bugs were fixed:
- ACPI: dock: fix enum-conversion warning (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card->ctl_files_rwlock (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -> 'Frequency' (git-fixes).
- amd-xgbe: Add a check for an skb in the timestamp path (git-fixes).
- amd-xgbe: Add additional dynamic debug messages (git-fixes).
- amd-xgbe: Add additional ethtool statistics (git-fixes).
- amd-xgbe: Add ethtool show/set channels support (git-fixes).
- amd-xgbe: Add ethtool show/set ring parameter support (git-fixes).
- amd-xgbe: Add ethtool support to retrieve SFP module info (git-fixes).
- amd-xgbe: Add hardware features debug output (git-fixes).
- amd-xgbe: Add NUMA affinity support for IRQ hints (git-fixes).
- amd-xgbe: Add NUMA affinity support for memory allocations (git-fixes).
- amd-xgbe: Add per queue Tx and Rx statistics (git-fixes).
- amd-xgbe: Advertise FEC support with the KR re-driver (git-fixes).
- amd-xgbe: Always attempt link training in KR mode (git-fixes).
- amd-xgbe: Be sure driver shuts down cleanly on module removal (git-fixes).
- amd-xgbe: Convert to generic power management (git-fixes).
- amd-xgbe: Fix debug output of max channel counts (git-fixes).
- amd-xgbe: Fix error path in xgbe_mod_init() (git-fixes).
- amd-xgbe: Fixes for working with PHYs that support 2.5GbE (git-fixes).
- amd-xgbe: Fix SFP PHY supported/advertised settings (git-fixes).
- amd-xgbe: fix spelling mistake: 'avialable' -> 'available' (git-fixes).
- amd-xgbe: Handle return code from software reset function (git-fixes).
- amd-xgbe: Improve SFP 100Mbps auto-negotiation (git-fixes).
- amd-xgbe: Interrupt summary bits are h/w version dependent (git-fixes).
- amd-xgbe: Limit the I2C error messages that are output (git-fixes).
- amd-xgbe: Mark expected switch fall-throughs (git-fixes).
- amd-xgbe: Optimize DMA channel interrupt enablement (git-fixes).
- amd-xgbe: Prepare for ethtool set-channel support (git-fixes).
- amd-xgbe: Read and save the port property registers during probe (git-fixes).
- amd-xgbe: Remove field that indicates SFP diagnostic support (git-fixes).
- amd-xgbe: remove unnecessary conversion to bool (git-fixes).
- amd-xgbe: Remove use of comm_owned field (git-fixes).
- amd-xgbe: Set the MDIO mode for 10000Base-T configuration (git-fixes).
- amd-xgbe: Simplify the burst length settings (git-fixes).
- amd-xgbe: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- amd-xgbe: use dma_mapping_error to check map errors (git-fixes).
- amd-xgbe: Use __napi_schedule() in BH context (git-fixes).
- amd-xgbe: Use the proper register during PTP initialization (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blk-mq: order adding requests to hctx->dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi->io_pages is always initialized (bsc#1177749).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- bnxt: do not enable NAPI until rings are ready (networking-stable-20_09_11).
- bnxt_en: Check for zero dir entries in NVRAM (networking-stable-20_09_11).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: fix incorrect updating of log root tree (bsc#1177687).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: remove root usage from can_overcommit (bsc#1131277).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- btrfs: take overcommit into account in inc_block_group_ro (bsc#1176560).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- ceph: fix memory leak in ceph_cleanup_snapid_map() (bsc#1178234).
- ceph: map snapid to anonymous bdev ID (bsc#1178234).
- ceph: promote to unsigned long long before shifting (bsc#1178187).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- coredump: fix crash when umh is disabled (bsc#1177753).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: ccp - fix error handling (git-fixes).
- crypto: dh - check validity of Z before export (bsc#1175716).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175716).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175716).
- crypto: ecdh - check validity of Z before export (bsc#1175716).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- device property: Do not clear secondary pointer for shared primary firmware node (git-fixes).
- device property: Keep secondary firmware node secondary by type (git-fixes).
- Disable CONFIG_LIVEPATCH_IPA_CLONES where not needed Explicitly disable CONFIG_LIVEPATCH_IPA_CLONES in configs where it is not needed to avoid confusion and unwanted values due to fragment config files.
- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let's disable it at building out-of-tree codes
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- drivers: net: add missing interrupt.h include (git-fixes).
- drivers/net/ethernet/marvell/mvmdio.c: Fix non OF case (git-fixes).
- drm/amdgpu: prevent double kfree ttm->sg (git-fixes).
- drm/gma500: fix error check (git-fixes).
- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- ea43d9709f72 ('nvme: fix identify error status silent ignore')
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1112178).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- ext4: fix dir_nlink behaviour (bsc#1177359).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- ibmvnic: save changed mac address to adapter->mac_addr (bsc#1134760 ltc#177449 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio:adc:max1118 Fix alignment of timestamp and data leak issues (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- include/linux/swapops.h: correct guards for non_swap_entry() (git-fixes (mm/swap)).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (git-fixes).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- leds: mt6323: move period calculation (git-fixes).
- libceph: clear con->out_msg on Policy::stateful_server faults (bsc#1178188).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- lib/mpi: Add mpi_sub_ui() (bsc#1175716).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: handle lack of sband->bitrates in rates (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mlx5 PPC ringsize workaround (bsc#1173432).
- mlx5: remove support for ib_get_vector_affinity (bsc#1174748).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm: hugetlb: switch to css_tryget() in hugetlb_cgroup_charge_cgroup() (git-fixes (mm/hugetlb)).
- mm/ksm.c: do not WARN if page is still mapped in remove_stable_node() (git-fixes (mm/hugetlb)).
- mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm() (bsc#1177685).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/mempolicy.c: use match_string() helper to simplify the code (git-fixes (mm/mempolicy)).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (git-fixes (mm/numa)).
- mm/page_owner.c: remove drain_all_pages from init_early_allocated_pages (git-fixes (mm/debug)).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm/page-writeback.c: use div64_ul() for u64-by-unsigned-long divide (git-fixes (mm/writeback)).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm/zsmalloc.c: fix build when CONFIG_COMPACTION=n (git-fixes (mm/zsmalloc)).
- mm/zsmalloc.c: fix race condition in zs_destroy_pool (git-fixes (mm/zsmalloc)).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- mm/zsmalloc.c: migration can leave pages in ZS_EMPTY indefinitely (git-fixes (mm/zsmalloc)).
- Move the upstreamed bluetooth fix into sorted section
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: 8390: Fix manufacturer name in Kconfig help text (git-fixes).
- net: amd: fix return type of ndo_start_xmit function (git-fixes).
- net/amd: Remove useless driver version (git-fixes).
- net: amd-xgbe: fix comparison to bitshift when dealing with a mask (git-fixes).
- net: amd-xgbe: Get rid of custom hex_dump_to_buffer() (git-fixes).
- net: apple: Fix manufacturer name in Kconfig help text (git-fixes).
- net: broadcom: Fix manufacturer name in Kconfig help text (git-fixes).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).
- net: Fix potential wrong skb->protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- net/mlx5e: Take common TIR context settings into a function (bsc#1177740).
- net/mlx5e: Turn on HW tunnel offload in all TIRs (bsc#1177740).
- net: mvmdio: defer probe of orion-mdio if a clock is not ready (git-fixes).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: tc35815: Explicitly check NET_IP_ALIGN is not zero in tc35815_rx (git-fixes).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).
- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).
- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- nvme: add a Identify Namespace Identification Descriptor list quirk (bsc#1174748). add two previous futile attempts to fix the bug to blacklist.conf
- nvme: do not update disk info for multipathed device (bsc#1171558).
- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1174748).
- nvme: fix deadlock caused by ANA update wrong locking (bsc#1174748).
- nvme: fix possible io failures when removing multipathed ns (bsc#1174748).
- nvme: make nvme_identify_ns propagate errors back (bsc#1174748).
- nvme: make nvme_report_ns_ids propagate error back (bsc#1174748).
- nvme-multipath: do not reset on unknown status (bsc#1174748).
- nvme: Namepace identification descriptor list is optional (bsc#1174748).
- nvme: pass status to nvme_error_status (bsc#1174748).
- nvme-rdma: Avoid double freeing of async event data (bsc#1174748).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- nvme: return error from nvme_alloc_ns() (bsc#1174748).
- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1114648).
- perf/x86: Fix n_pair for cancelled txn (bsc#1114648).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- pty: do tty_flip_buffer_push without port->lock in pty_write (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtl8xxxu: prevent potential memory leak (git-fixes).
- scsi: fnic: Do not call 'scsi_done()' for unhandled commands (bsc#1168468, bsc#1171675).
- scsi: hisi_sas: Add debugfs ITCT file and add file operations (bsc#1140683).
- scsi: hisi_sas: Add manual trigger for debugfs dump (bsc#1140683).
- scsi: hisi_sas: Add missing seq_printf() call in hisi_sas_show_row_32() (bsc#1140683).
- scsi: hisi_sas: Change return variable type in phy_up_v3_hw() (bsc#1140683).
- scsi: hisi_sas: Correct memory allocation size for DQ debugfs (bsc#1140683).
- scsi: hisi_sas: Do some more tidy-up (bsc#1140683).
- scsi: hisi_sas: Fix a timeout race of driver internal and SMP IO (bsc#1140683).
- scsi: hisi_sas: Fix type casting and missing static qualifier in debugfs code (bsc#1140683). Refresh:
- scsi: hisi_sas: No need to check return value of debugfs_create functions (bsc#1140683). Update:
- scsi: hisi_sas: Some misc tidy-up (bsc#1140683).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix memory size truncation (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Performance tweak (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1176946 bsc#1175520 bsc#1172538).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).
- target-use-scsi_set_sense_information-helper-on-misc.patch: (bsc#1177719).
- tg3: Fix soft lockup when tg3_reset_task() fails (networking-stable-20_09_11).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb->data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: earlycon dependency (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- USB: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- USB: cdc-acm: handle broken union descriptors (git-fixes).
- USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- USB: core: Solve race condition in anchor cleanup functions (git-fixes).
- USB: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- USB: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- USB: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- USB: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- USB: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- USB: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- USB: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- USB: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- USB: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- USB: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).
- USB: ohci: Default to per-port over-current protection (git-fixes).
- USB: serial: qcserial: fix altsetting probing (git-fixes).
- vfs: fix FIGETBSZ ioctl on an overlayfs file (bsc#1178202).
- video: fbdev: sis: fix null ptr dereference (git-fixes).
- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: iTCO_wdt: Export vendorsupport (bsc#1177101).
- watchdog: iTCO_wdt: Make ICH_RES_IO_SMI optional (bsc#1177101).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode->i_io_list with inode->i_lock (bsc#1177755).
- x86/apic: Unify duplicated local apic timer clockevent initialization (bsc#1112178).
- x86, fakenuma: Fix invalid starting node ID (git-fixes (mm/x86/fakenuma)).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1112178).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
- xfs: avoid infinite loop when cancelling CoW blocks after writeback failure (bsc#1178027).
- xfs: limit entries returned when counting fsmap records (git-fixes).
- xgbe: no need to check return value of debugfs_create functions (git-fixes).
- xgbe: switch to more generic VxLAN detection (git-fixes).
Patchnames
SUSE-2020-3281,SUSE-SLE-SERVER-12-SP5-2020-3281
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 kernel Azure was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).\n- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).\n- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bnc#1176723).\n- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).\n- CVE-2020-16120: Fixed a permissions issue in ovl_path_open() (bsc#1177470).\n- CVE-2020-12351: Implemented a kABI workaround for bluetooth l2cap_ops filter addition (bsc#1177724).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 (bsc#1177725).\n- CVE-2020-25212: Fixed a TOCTOU mismatch in the NFS client code (bnc#1176381).\n- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).\n- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)\n- CVE-2020-27675: Fixed a race condition in event handler which may crash dom0 (XSA-331 bsc#1177410).\n- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)\n\nThe following non-security bugs were fixed:\n\n- ACPI: dock: fix enum-conversion warning (git-fixes).\n- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).\n- ALSA: compress_offload: remove redundant initialization (git-fixes).\n- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).\n- ALSA: core: pcm: simplify locking for timers (git-fixes).\n- ALSA: core: timer: clarify operator precedence (git-fixes).\n- ALSA: core: timer: remove redundant assignment (git-fixes).\n- ALSA: ctl: Workaround for lockdep warning wrt card-\u003ectl_files_rwlock (git-fixes).\n- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).\n- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).\n- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).\n- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).\n- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).\n- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).\n- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).\n- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).\n- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).\n- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).\n- ALSA: usb-audio: endpoint.c: fix repeated word \u0027there\u0027 (git-fixes).\n- ALSA: usb-audio: fix spelling mistake \u0027Frequence\u0027 -\u003e \u0027Frequency\u0027 (git-fixes).\n- amd-xgbe: Add a check for an skb in the timestamp path (git-fixes).\n- amd-xgbe: Add additional dynamic debug messages (git-fixes).\n- amd-xgbe: Add additional ethtool statistics (git-fixes).\n- amd-xgbe: Add ethtool show/set channels support (git-fixes).\n- amd-xgbe: Add ethtool show/set ring parameter support (git-fixes).\n- amd-xgbe: Add ethtool support to retrieve SFP module info (git-fixes).\n- amd-xgbe: Add hardware features debug output (git-fixes).\n- amd-xgbe: Add NUMA affinity support for IRQ hints (git-fixes).\n- amd-xgbe: Add NUMA affinity support for memory allocations (git-fixes).\n- amd-xgbe: Add per queue Tx and Rx statistics (git-fixes).\n- amd-xgbe: Advertise FEC support with the KR re-driver (git-fixes).\n- amd-xgbe: Always attempt link training in KR mode (git-fixes).\n- amd-xgbe: Be sure driver shuts down cleanly on module removal (git-fixes).\n- amd-xgbe: Convert to generic power management (git-fixes).\n- amd-xgbe: Fix debug output of max channel counts (git-fixes).\n- amd-xgbe: Fix error path in xgbe_mod_init() (git-fixes).\n- amd-xgbe: Fixes for working with PHYs that support 2.5GbE (git-fixes).\n- amd-xgbe: Fix SFP PHY supported/advertised settings (git-fixes).\n- amd-xgbe: fix spelling mistake: \u0027avialable\u0027 -\u003e \u0027available\u0027 (git-fixes).\n- amd-xgbe: Handle return code from software reset function (git-fixes).\n- amd-xgbe: Improve SFP 100Mbps auto-negotiation (git-fixes).\n- amd-xgbe: Interrupt summary bits are h/w version dependent (git-fixes).\n- amd-xgbe: Limit the I2C error messages that are output (git-fixes).\n- amd-xgbe: Mark expected switch fall-throughs (git-fixes).\n- amd-xgbe: Optimize DMA channel interrupt enablement (git-fixes).\n- amd-xgbe: Prepare for ethtool set-channel support (git-fixes).\n- amd-xgbe: Read and save the port property registers during probe (git-fixes).\n- amd-xgbe: Remove field that indicates SFP diagnostic support (git-fixes).\n- amd-xgbe: remove unnecessary conversion to bool (git-fixes).\n- amd-xgbe: Remove use of comm_owned field (git-fixes).\n- amd-xgbe: Set the MDIO mode for 10000Base-T configuration (git-fixes).\n- amd-xgbe: Simplify the burst length settings (git-fixes).\n- amd-xgbe: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- amd-xgbe: use dma_mapping_error to check map errors (git-fixes).\n- amd-xgbe: Use __napi_schedule() in BH context (git-fixes).\n- amd-xgbe: Use the proper register during PTP initialization (git-fixes).\n- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).\n- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).\n- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).\n- ath10k: Fix the size used in a \u0027dma_free_coherent()\u0027 call in an error handling path (git-fixes).\n- ath10k: provide survey info as accumulated data (git-fixes).\n- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).\n- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).\n- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).\n- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).\n- blk-mq: order adding requests to hctx-\u003edispatch and checking SCHED_RESTART (bsc#1177750).\n- block: ensure bdi-\u003eio_pages is always initialized (bsc#1177749).\n- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).\n- Bluetooth: Only mark socket zapped after unlocking (git-fixes).\n- bnxt: do not enable NAPI until rings are ready (networking-stable-20_09_11).\n- bnxt_en: Check for zero dir entries in NVRAM (networking-stable-20_09_11).\n- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).\n- brcmfmac: check ndev pointer (git-fixes).\n- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).\n- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).\n- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).\n- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).\n- btrfs: fix incorrect updating of log root tree (bsc#1177687).\n- btrfs: fix race between page release and a fast fsync (bsc#1177687).\n- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).\n- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).\n- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).\n- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).\n- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).\n- btrfs: release old extent maps during page release (bsc#1177687).\n- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).\n- btrfs: remove root usage from can_overcommit (bsc#1131277).\n- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).\n- btrfs: take overcommit into account in inc_block_group_ro (bsc#1176560).\n- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).\n- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).\n- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).\n- can: softing: softing_card_shutdown(): add braces around empty body in an \u0027if\u0027 statement (git-fixes).\n- ceph: fix memory leak in ceph_cleanup_snapid_map() (bsc#1178234).\n- ceph: map snapid to anonymous bdev ID (bsc#1178234).\n- ceph: promote to unsigned long long before shifting (bsc#1178187).\n- clk: at91: remove the checking of parent_name (git-fixes).\n- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).\n- clk: imx8mq: Fix usdhc parents order (git-fixes).\n- coredump: fix crash when umh is disabled (bsc#1177753).\n- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).\n- crypto: ccp - fix error handling (git-fixes).\n- crypto: dh - check validity of Z before export (bsc#1175716).\n- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175716).\n- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175716).\n- crypto: ecdh - check validity of Z before export (bsc#1175716).\n- crypto: ixp4xx - Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).\n- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).\n- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).\n- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).\n- device property: Do not clear secondary pointer for shared primary firmware node (git-fixes).\n- device property: Keep secondary firmware node secondary by type (git-fixes).\n- Disable CONFIG_LIVEPATCH_IPA_CLONES where not needed Explicitly disable CONFIG_LIVEPATCH_IPA_CLONES in configs where it is not needed to avoid confusion and unwanted values due to fragment config files.\n- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let\u0027s disable it at building out-of-tree codes\n- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).\n- drivers: net: add missing interrupt.h include (git-fixes).\n- drivers/net/ethernet/marvell/mvmdio.c: Fix non OF case (git-fixes).\n- drm/amdgpu: prevent double kfree ttm-\u003esg (git-fixes).\n- drm/gma500: fix error check (git-fixes).\n- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (git-fixes).\n- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).\n- drm/sun4i: mixer: Extend regmap max_register (git-fixes).\n- ea43d9709f72 (\u0027nvme: fix identify error status silent ignore\u0027)\n- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1112178).\n- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).\n- ext4: fix dir_nlink behaviour (bsc#1177359).\n- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).\n- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).\n- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).\n- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).\n- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).\n- i2c: meson: fix clock setting overwrite (git-fixes).\n- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).\n- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).\n- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).\n- ibmvnic: save changed mac address to adapter-\u003emac_addr (bsc#1134760 ltc#177449 git-fixes).\n- icmp: randomize the global rate limiter (git-fixes).\n- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).\n- iio:adc:max1118 Fix alignment of timestamp and data leak issues (git-fixes).\n- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).\n- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).\n- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).\n- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).\n- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).\n- include/linux/swapops.h: correct guards for non_swap_entry() (git-fixes (mm/swap)).\n- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (git-fixes).\n- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).\n- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).\n- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).\n- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).\n- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).\n- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).\n- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).\n- kbuild: enforce -Werror=return-type (bsc#1177281).\n- leds: mt6323: move period calculation (git-fixes).\n- libceph: clear con-\u003eout_msg on Policy::stateful_server faults (bsc#1178188).\n- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).\n- lib/mpi: Add mpi_sub_ui() (bsc#1175716).\n- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).\n- mac80211: handle lack of sband-\u003ebitrates in rates (git-fixes).\n- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).\n- mailbox: avoid timer start from callback (git-fixes).\n- media: ati_remote: sanity check for both endpoints (git-fixes).\n- media: bdisp: Fix runtime PM imbalance on error (git-fixes).\n- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).\n- media: exynos4-is: Fix a reference count leak (git-fixes).\n- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).\n- media: firewire: fix memory leak (git-fixes).\n- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).\n- media: media/pci: prevent memory leak in bttv_probe (git-fixes).\n- media: omap3isp: Fix memleak in isp_probe (git-fixes).\n- media: platform: fcp: Fix a reference count leak (git-fixes).\n- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).\n- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).\n- media: Revert \u0027media: exynos4-is: Add missed check for pinctrl_lookup_state()\u0027 (git-fixes).\n- media: s5p-mfc: Fix a reference count leak (git-fixes).\n- media: saa7134: avoid a shift overflow (git-fixes).\n- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).\n- media: sti: Fix reference count leaks (git-fixes).\n- media: tc358743: initialize variable (git-fixes).\n- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).\n- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).\n- media: usbtv: Fix refcounting mixup (git-fixes).\n- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).\n- media: vsp1: Fix runtime PM imbalance on error (git-fixes).\n- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).\n- memory: omap-gpmc: Fix a couple off by ones (git-fixes).\n- mfd: sm501: Fix leaks in probe() (git-fixes).\n- mic: vop: copy data to kernel space then write to io memory (git-fixes).\n- misc: mic: scif: Fix error handling path (git-fixes).\n- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).\n- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).\n- mlx5 PPC ringsize workaround (bsc#1173432).\n- mlx5: remove support for ib_get_vector_affinity (bsc#1174748). \n- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).\n- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).\n- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).\n- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).\n- mm: hugetlb: switch to css_tryget() in hugetlb_cgroup_charge_cgroup() (git-fixes (mm/hugetlb)).\n- mm/ksm.c: do not WARN if page is still mapped in remove_stable_node() (git-fixes (mm/hugetlb)).\n- mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm() (bsc#1177685).\n- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).\n- mm/mempolicy.c: use match_string() helper to simplify the code (git-fixes (mm/mempolicy)).\n- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (git-fixes (mm/numa)).\n- mm/page_owner.c: remove drain_all_pages from init_early_allocated_pages (git-fixes (mm/debug)).\n- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).\n- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).\n- mm/page-writeback.c: use div64_ul() for u64-by-unsigned-long divide (git-fixes (mm/writeback)).\n- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).\n- mm/zsmalloc.c: fix build when CONFIG_COMPACTION=n (git-fixes (mm/zsmalloc)).\n- mm/zsmalloc.c: fix race condition in zs_destroy_pool (git-fixes (mm/zsmalloc)).\n- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).\n- mm/zsmalloc.c: migration can leave pages in ZS_EMPTY indefinitely (git-fixes (mm/zsmalloc)).\n- Move the upstreamed bluetooth fix into sorted section\n- mtd: lpddr: fix excessive stack usage with clang (git-fixes).\n- mtd: mtdoops: Do not write panic data twice (git-fixes).\n- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).\n- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).\n- mwifiex: fix double free (git-fixes).\n- mwifiex: remove function pointer check (git-fixes).\n- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).\n- net: 8390: Fix manufacturer name in Kconfig help text (git-fixes).\n- net: amd: fix return type of ndo_start_xmit function (git-fixes).\n- net/amd: Remove useless driver version (git-fixes).\n- net: amd-xgbe: fix comparison to bitshift when dealing with a mask (git-fixes).\n- net: amd-xgbe: Get rid of custom hex_dump_to_buffer() (git-fixes).\n- net: apple: Fix manufacturer name in Kconfig help text (git-fixes).\n- net: broadcom: Fix manufacturer name in Kconfig help text (git-fixes).\n- net: disable netpoll on fresh napis (networking-stable-20_09_11).\n- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).\n- net: Fix potential wrong skb-\u003eprotocol in skb_vlan_untag() (networking-stable-20_08_24).\n- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).\n- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).\n- netlabel: fix problems with mapping removal (networking-stable-20_09_11).\n- net/mlx5e: Take common TIR context settings into a function (bsc#1177740).\n- net/mlx5e: Turn on HW tunnel offload in all TIRs (bsc#1177740).\n- net: mvmdio: defer probe of orion-mdio if a clock is not ready (git-fixes).\n- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).\n- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).\n- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).\n- net: tc35815: Explicitly check NET_IP_ALIGN is not zero in tc35815_rx (git-fixes).\n- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).\n- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).\n- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).\n- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).\n- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).\n- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).\n- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).\n- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix non-split wiphy information (git-fixes).\n- NTB: hw: amd: fix an issue about leak system resources (git-fixes).\n- nvme: add a Identify Namespace Identification Descriptor list quirk (bsc#1174748). add two previous futile attempts to fix the bug to blacklist.conf\n- nvme: do not update disk info for multipathed device (bsc#1171558). \n- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1174748).\n- nvme: fix deadlock caused by ANA update wrong locking (bsc#1174748).\n- nvme: fix possible io failures when removing multipathed ns (bsc#1174748).\n- nvme: make nvme_identify_ns propagate errors back (bsc#1174748).\n- nvme: make nvme_report_ns_ids propagate error back (bsc#1174748).\n- nvme-multipath: do not reset on unknown status (bsc#1174748).\n- nvme: Namepace identification descriptor list is optional (bsc#1174748).\n- nvme: pass status to nvme_error_status (bsc#1174748).\n- nvme-rdma: Avoid double freeing of async event data (bsc#1174748).\n- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).\n- nvme-rdma: fix crash when connect rejected (bsc#1174748).\n- nvme: return error from nvme_alloc_ns() (bsc#1174748).\n- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1114648).\n- perf/x86: Fix n_pair for cancelled txn (bsc#1114648).\n- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).\n- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).\n- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).\n- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).\n- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).\n- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).\n- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).\n- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).\n- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).\n- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).\n- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).\n- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).\n- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).\n- pty: do tty_flip_buffer_push without port-\u003elock in pty_write (git-fixes).\n- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).\n- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).\n- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).\n- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)\n- rtl8xxxu: prevent potential memory leak (git-fixes).\n- scsi: fnic: Do not call \u0027scsi_done()\u0027 for unhandled commands (bsc#1168468, bsc#1171675).\n- scsi: hisi_sas: Add debugfs ITCT file and add file operations (bsc#1140683).\n- scsi: hisi_sas: Add manual trigger for debugfs dump (bsc#1140683).\n- scsi: hisi_sas: Add missing seq_printf() call in hisi_sas_show_row_32() (bsc#1140683).\n- scsi: hisi_sas: Change return variable type in phy_up_v3_hw() (bsc#1140683).\n- scsi: hisi_sas: Correct memory allocation size for DQ debugfs (bsc#1140683).\n- scsi: hisi_sas: Do some more tidy-up (bsc#1140683).\n- scsi: hisi_sas: Fix a timeout race of driver internal and SMP IO (bsc#1140683).\n- scsi: hisi_sas: Fix type casting and missing static qualifier in debugfs code (bsc#1140683). Refresh:\n- scsi: hisi_sas: No need to check return value of debugfs_create functions (bsc#1140683). Update:\n- scsi: hisi_sas: Some misc tidy-up (bsc#1140683).\n- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).\n- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).\n- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Performance tweak (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Remove unneeded variable \u0027rval\u0027 (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1176946 bsc#1175520 bsc#1172538).\n- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).\n- spi: fsl-espi: Only process interrupts for expected events (git-fixes).\n- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).\n- target-use-scsi_set_sense_information-helper-on-misc.patch: (bsc#1177719).\n- tg3: Fix soft lockup when tg3_reset_task() fails (networking-stable-20_09_11).\n- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).\n- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).\n- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).\n- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).\n- tipc: fix uninit skb-\u003edata in tipc_nl_compat_dumpit() (networking-stable-20_08_24).\n- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).\n- tty: ipwireless: fix error handling (git-fixes).\n- tty: serial: earlycon dependency (git-fixes).\n- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).\n- USB: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).\n- USB: cdc-acm: handle broken union descriptors (git-fixes).\n- USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).\n- USB: core: Solve race condition in anchor cleanup functions (git-fixes).\n- USB: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).\n- USB: dwc2: Fix parameter type in function pointer prototype (git-fixes).\n- USB: dwc3: core: add phy cleanup for probe error handling (git-fixes).\n- USB: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).\n- USB: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).\n- USB: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).\n- USB: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).\n- USB: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).\n- USB: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).\n- USB: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).\n- USB: ohci: Default to per-port over-current protection (git-fixes).\n- USB: serial: qcserial: fix altsetting probing (git-fixes).\n- vfs: fix FIGETBSZ ioctl on an overlayfs file (bsc#1178202).\n- video: fbdev: sis: fix null ptr dereference (git-fixes).\n- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).\n- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).\n- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).\n- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).\n- watchdog: iTCO_wdt: Export vendorsupport (bsc#1177101).\n- watchdog: iTCO_wdt: Make ICH_RES_IO_SMI optional (bsc#1177101).\n- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).\n- writeback: Avoid skipping inode writeback (bsc#1177755).\n- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).\n- writeback: Protect inode-\u003ei_io_list with inode-\u003ei_lock (bsc#1177755).\n- x86/apic: Unify duplicated local apic timer clockevent initialization (bsc#1112178).\n- x86, fakenuma: Fix invalid starting node ID (git-fixes (mm/x86/fakenuma)).\n- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1112178).\n- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).\n- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/events: add a new \u0027late EOI\u0027 evtchn framework (XSA-332 bsc#1177411).\n- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).\n- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).\n- xen/events: block rogue events for some time (XSA-332 bsc#1177411).\n- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).\n- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).\n- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).\n- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).\n- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).\n- xen/gntdev.c: Mark pages as dirty (bsc#1065600).\n- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).\n- xfs: avoid infinite loop when cancelling CoW blocks after writeback failure (bsc#1178027).\n- xfs: limit entries returned when counting fsmap records (git-fixes).\n- xgbe: no need to check return value of debugfs_create functions (git-fixes).\n- xgbe: switch to more generic VxLAN detection (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3281,SUSE-SLE-SERVER-12-SP5-2020-3281", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3281-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3281-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203281-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3281-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" }, { "category": "self", "summary": "SUSE Bug 1055014", "url": "https://bugzilla.suse.com/1055014" }, { "category": "self", "summary": "SUSE Bug 1061843", "url": "https://bugzilla.suse.com/1061843" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066382", "url": "https://bugzilla.suse.com/1066382" }, { "category": "self", "summary": "SUSE Bug 1077428", "url": "https://bugzilla.suse.com/1077428" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1114648", "url": "https://bugzilla.suse.com/1114648" }, { "category": "self", "summary": "SUSE Bug 1131277", "url": "https://bugzilla.suse.com/1131277" }, { "category": "self", "summary": "SUSE Bug 1134760", "url": "https://bugzilla.suse.com/1134760" }, { "category": "self", "summary": "SUSE Bug 1140683", "url": "https://bugzilla.suse.com/1140683" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1157424", "url": "https://bugzilla.suse.com/1157424" }, { "category": "self", "summary": "SUSE Bug 1163592", "url": "https://bugzilla.suse.com/1163592" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1172757", "url": "https://bugzilla.suse.com/1172757" }, { "category": "self", "summary": "SUSE Bug 1173432", "url": "https://bugzilla.suse.com/1173432" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1175520", "url": "https://bugzilla.suse.com/1175520" }, { "category": "self", "summary": "SUSE Bug 1175716", "url": "https://bugzilla.suse.com/1175716" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1176354", "url": "https://bugzilla.suse.com/1176354" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176395", "url": "https://bugzilla.suse.com/1176395" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176410", "url": "https://bugzilla.suse.com/1176410" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176560", "url": "https://bugzilla.suse.com/1176560" }, { "category": "self", "summary": "SUSE Bug 1176713", "url": "https://bugzilla.suse.com/1176713" }, { "category": "self", "summary": "SUSE Bug 1176723", "url": "https://bugzilla.suse.com/1176723" }, { "category": "self", "summary": "SUSE Bug 1176946", "url": "https://bugzilla.suse.com/1176946" }, { "category": "self", "summary": "SUSE Bug 1177027", "url": "https://bugzilla.suse.com/1177027" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177101", "url": "https://bugzilla.suse.com/1177101" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177281", "url": "https://bugzilla.suse.com/1177281" }, { "category": "self", "summary": "SUSE Bug 1177340", "url": "https://bugzilla.suse.com/1177340" }, { "category": "self", "summary": "SUSE Bug 1177359", "url": "https://bugzilla.suse.com/1177359" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177685", "url": "https://bugzilla.suse.com/1177685" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177740", "url": "https://bugzilla.suse.com/1177740" }, { "category": "self", "summary": "SUSE Bug 1177749", "url": "https://bugzilla.suse.com/1177749" }, { "category": "self", "summary": "SUSE Bug 1177750", "url": "https://bugzilla.suse.com/1177750" }, { "category": "self", "summary": "SUSE Bug 1177753", "url": "https://bugzilla.suse.com/1177753" }, { "category": "self", "summary": "SUSE Bug 1177754", "url": "https://bugzilla.suse.com/1177754" }, { "category": "self", "summary": "SUSE Bug 1177755", "url": "https://bugzilla.suse.com/1177755" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177855", "url": "https://bugzilla.suse.com/1177855" }, { "category": "self", "summary": "SUSE Bug 1177856", "url": "https://bugzilla.suse.com/1177856" }, { "category": "self", "summary": "SUSE Bug 1177861", "url": "https://bugzilla.suse.com/1177861" }, { "category": "self", "summary": "SUSE Bug 1178027", "url": "https://bugzilla.suse.com/1178027" }, { "category": "self", "summary": "SUSE Bug 1178166", "url": "https://bugzilla.suse.com/1178166" }, { "category": "self", "summary": "SUSE Bug 1178185", "url": "https://bugzilla.suse.com/1178185" }, { "category": "self", "summary": "SUSE Bug 1178187", "url": "https://bugzilla.suse.com/1178187" }, { "category": "self", "summary": "SUSE Bug 1178188", "url": "https://bugzilla.suse.com/1178188" }, { "category": "self", "summary": "SUSE Bug 1178202", "url": "https://bugzilla.suse.com/1178202" }, { "category": "self", "summary": "SUSE Bug 1178234", "url": "https://bugzilla.suse.com/1178234" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 936888", "url": "https://bugzilla.suse.com/936888" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0430 page", "url": "https://www.suse.com/security/cve/CVE-2020-0430/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27673 page", "url": "https://www.suse.com/security/cve/CVE-2020-27673/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27675 page", "url": "https://www.suse.com/security/cve/CVE-2020-27675/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-11-14T08:18:31Z", "generator": { "date": "2020-11-14T08:18:31Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3281-1", "initial_release_date": "2020-11-14T08:18:31Z", "revision_history": [ { "date": "2020-11-14T08:18:31Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-16.34.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-16.34.1.noarch", "product_id": "kernel-devel-azure-4.12.14-16.34.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-16.34.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-16.34.1.noarch", "product_id": "kernel-source-azure-4.12.14-16.34.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-16.34.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-16.34.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-16.34.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-16.34.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-16.34.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-16.34.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-16.34.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-16.34.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-16.34.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-16.34.1.x86_64", "product": { "name": "kernel-azure-4.12.14-16.34.1.x86_64", "product_id": "kernel-azure-4.12.14-16.34.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-16.34.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-16.34.1.x86_64", "product_id": "kernel-azure-base-4.12.14-16.34.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-16.34.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-16.34.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-16.34.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-16.34.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-16.34.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-16.34.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-devel-4.12.14-16.34.1.x86_64", "product": { "name": "kernel-azure-kgraft-devel-4.12.14-16.34.1.x86_64", "product_id": "kernel-azure-kgraft-devel-4.12.14-16.34.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-16.34.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-16.34.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-16.34.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-16.34.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-16.34.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-16.34.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-16.34.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-16.34.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-16.34.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.34.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.34.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.34.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.34.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.34.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.34.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.34.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.34.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0430" } ], "notes": [ { "category": "general", "text": "In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0430", "url": "https://www.suse.com/security/cve/CVE-2020-0430" }, { "category": "external", "summary": "SUSE Bug 1176723 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1176723" }, { "category": "external", "summary": "SUSE Bug 1178003 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1178003" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-14T08:18:31Z", "details": "important" } ], "title": "CVE-2020-0430" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-14T08:18:31Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-14T08:18:31Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-14T08:18:31Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-14T08:18:31Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-14T08:18:31Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-14T08:18:31Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-14T08:18:31Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-14T08:18:31Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-14T08:18:31Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-27673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27673" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27673", "url": "https://www.suse.com/security/cve/CVE-2020-27673" }, { "category": "external", "summary": "SUSE Bug 1177411 for CVE-2020-27673", "url": "https://bugzilla.suse.com/1177411" }, { "category": "external", "summary": "SUSE Bug 1184583 for CVE-2020-27673", "url": "https://bugzilla.suse.com/1184583" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-14T08:18:31Z", "details": "moderate" } ], "title": "CVE-2020-27673" }, { "cve": "CVE-2020-27675", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27675" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27675", "url": "https://www.suse.com/security/cve/CVE-2020-27675" }, { "category": "external", "summary": "SUSE Bug 1177410 for CVE-2020-27675", "url": "https://bugzilla.suse.com/1177410" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-14T08:18:31Z", "details": "moderate" } ], "title": "CVE-2020-27675" } ] }
suse-su-2020:3441-1
Vulnerability from csaf_suse
Published
2020-11-19 16:20
Modified
2020-11-19 16:20
Summary
Security update for the Linux Kernel (Live Patch 17 for SLE 15)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 17 for SLE 15)
Description of the patch
This update for the Linux Kernel 4.12.14-150_47 fixes several issues.
The following security issues were fixed:
- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bsc#1176723, bsc#1178003).
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724, bsc#1177729, bsc#1178397).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
Patchnames
SUSE-2020-3441,SUSE-SLE-Live-Patching-12-SP4-2020-3441,SUSE-SLE-Live-Patching-12-SP4-2020-3442,SUSE-SLE-Live-Patching-12-SP4-2020-3444,SUSE-SLE-Live-Patching-12-SP4-2020-3446,SUSE-SLE-Live-Patching-12-SP4-2020-3447,SUSE-SLE-Live-Patching-12-SP4-2020-3448,SUSE-SLE-Module-Live-Patching-15-2020-3435,SUSE-SLE-Module-Live-Patching-15-2020-3437,SUSE-SLE-Module-Live-Patching-15-2020-3438,SUSE-SLE-Module-Live-Patching-15-2020-3439
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 17 for SLE 15)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-150_47 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bsc#1176723, bsc#1178003).\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724, bsc#1177729, bsc#1178397).\n- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3441,SUSE-SLE-Live-Patching-12-SP4-2020-3441,SUSE-SLE-Live-Patching-12-SP4-2020-3442,SUSE-SLE-Live-Patching-12-SP4-2020-3444,SUSE-SLE-Live-Patching-12-SP4-2020-3446,SUSE-SLE-Live-Patching-12-SP4-2020-3447,SUSE-SLE-Live-Patching-12-SP4-2020-3448,SUSE-SLE-Module-Live-Patching-15-2020-3435,SUSE-SLE-Module-Live-Patching-15-2020-3437,SUSE-SLE-Module-Live-Patching-15-2020-3438,SUSE-SLE-Module-Live-Patching-15-2020-3439", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3441-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3441-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203441-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3441-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007817.html" }, { "category": "self", "summary": "SUSE Bug 1177513", "url": "https://bugzilla.suse.com/1177513" }, { "category": "self", "summary": "SUSE Bug 1177729", "url": "https://bugzilla.suse.com/1177729" }, { "category": "self", "summary": "SUSE Bug 1178003", "url": "https://bugzilla.suse.com/1178003" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0430 page", "url": "https://www.suse.com/security/cve/CVE-2020-0430/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" } ], "title": "Security update for the Linux Kernel (Live Patch 17 for SLE 15)", "tracking": { "current_release_date": "2020-11-19T16:20:20Z", "generator": { "date": "2020-11-19T16:20:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3441-1", "initial_release_date": "2020-11-19T16:20:20Z", "revision_history": [ { "date": "2020-11-19T16:20:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "product_id": "kgraft-patch-4_12_14-95_60-default-3-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "product_id": "kgraft-patch-4_12_14-95_57-default-4-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "product_id": "kgraft-patch-4_12_14-95_54-default-4-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "product_id": "kgraft-patch-4_12_14-95_51-default-6-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0430" } ], "notes": [ { "category": "general", "text": "In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0430", "url": "https://www.suse.com/security/cve/CVE-2020-0430" }, { "category": "external", "summary": "SUSE Bug 1176723 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1176723" }, { "category": "external", "summary": "SUSE Bug 1178003 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1178003" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-19T16:20:20Z", "details": "important" } ], "title": "CVE-2020-0430" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-19T16:20:20Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-19T16:20:20Z", "details": "important" } ], "title": "CVE-2020-25645" } ] }
suse-su-2020:3532-1
Vulnerability from csaf_suse
Published
2020-11-26 11:49
Modified
2020-11-26 11:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 LTSS kernel was updated to receive various security and bug fixes.
The following security bugs were fixed:
- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bnc#1178123).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bnc#1176723).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file (bsc#1177470).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).
- CVE-2020-2521: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)
- CVE-2020-27675: Fixed a race condition in event handler which may crash dom0 (XSA-331 bsc#1177410).
The following non-security bugs were fixed:
- btrfs: cleanup root usage by btrfs_get_alloc_profile (bsc#1131277).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366 bsc#1176922).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366 bsc#1176922).
- btrfs: remove root usage from can_overcommit (bsc#1131277).
- hyperv_fb: disable superfluous VERSION_WIN10_V5 case (bsc#1175306).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- livepatch: Add -fdump-ipa-clones to build (). Add support for -fdump-ipa-clones GCC option. Update config files accordingly.
- livepatch: Test if -fdump-ipa-clones is really available As of now we add -fdump-ipa-clones unconditionally. It does not cause a trouble if the kernel is build with the supported toolchain. Otherwise it could fail easily. Do the correct thing and test for the availability.
- powerpc/pseries/cpuidle: add polling idle for shared processor guests (bsc#1178765 ltc#188968).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1173233).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1173233).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- x86/hyperv: Create and use Hyper-V page definitions (bsc#1176877).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1058115 bsc#1176907).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
Patchnames
SUSE-2020-3532,SUSE-SLE-Module-Live-Patching-15-2020-3532,SUSE-SLE-Product-HA-15-2020-3532,SUSE-SLE-Product-HPC-15-2020-3532,SUSE-SLE-Product-SLES-15-2020-3532,SUSE-SLE-Product-SLES_SAP-15-2020-3532
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 LTSS kernel was updated to receive various security and bug fixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).\n- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).\n- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bnc#1178123).\n- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).\n- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).\n- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bnc#1176723).\n- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).\n- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file (bsc#1177470).\n- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 (bsc#1177725).\n- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).\n- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).\n- CVE-2020-2521: Fixed getxattr kernel panic and memory overflow (bsc#1176381).\n- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).\n- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).\n- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).\n- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).\n- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).\n- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).\n- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).\n- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).\n- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).\n- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).\n- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)\n- CVE-2020-27675: Fixed a race condition in event handler which may crash dom0 (XSA-331 bsc#1177410).\n\nThe following non-security bugs were fixed:\n\n- btrfs: cleanup root usage by btrfs_get_alloc_profile (bsc#1131277).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366 bsc#1176922).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366 bsc#1176922).\n- btrfs: remove root usage from can_overcommit (bsc#1131277).\n- hyperv_fb: disable superfluous VERSION_WIN10_V5 case (bsc#1175306).\n- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).\n- livepatch: Add -fdump-ipa-clones to build (). Add support for -fdump-ipa-clones GCC option. Update config files accordingly.\n- livepatch: Test if -fdump-ipa-clones is really available As of now we add -fdump-ipa-clones unconditionally. It does not cause a trouble if the kernel is build with the supported toolchain. Otherwise it could fail easily. Do the correct thing and test for the availability.\n- powerpc/pseries/cpuidle: add polling idle for shared processor guests (bsc#1178765 ltc#188968).\n- scsi: qla2xxx: Do not consume srb greedily (bsc#1173233).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1173233).\n- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).\n- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).\n- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).\n- x86/hyperv: Create and use Hyper-V page definitions (bsc#1176877).\n- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).\n- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1058115 bsc#1176907).\n- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen: do not reschedule in preemption off sections (bsc#1175749).\n- xen/events: add a new \u0027late EOI\u0027 evtchn framework (XSA-332 bsc#1177411).\n- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).\n- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).\n- xen/events: block rogue events for some time (XSA-332 bsc#1177411).\n- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).\n- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).\n- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).\n- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).\n- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).\n- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3532,SUSE-SLE-Module-Live-Patching-15-2020-3532,SUSE-SLE-Product-HA-15-2020-3532,SUSE-SLE-Product-HPC-15-2020-3532,SUSE-SLE-Product-SLES-15-2020-3532,SUSE-SLE-Product-SLES_SAP-15-2020-3532", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3532-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3532-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203532-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3532-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1131277", "url": "https://bugzilla.suse.com/1131277" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1161360", "url": "https://bugzilla.suse.com/1161360" }, { "category": "self", "summary": "SUSE Bug 1163524", "url": "https://bugzilla.suse.com/1163524" }, { "category": "self", "summary": "SUSE Bug 1166965", "url": "https://bugzilla.suse.com/1166965" }, { "category": "self", "summary": "SUSE Bug 1170232", "url": "https://bugzilla.suse.com/1170232" }, { "category": "self", "summary": "SUSE Bug 1170415", "url": "https://bugzilla.suse.com/1170415" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1173115", "url": "https://bugzilla.suse.com/1173115" }, { "category": "self", "summary": "SUSE Bug 1173233", "url": "https://bugzilla.suse.com/1173233" }, { "category": "self", "summary": "SUSE Bug 1175306", "url": "https://bugzilla.suse.com/1175306" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175882", "url": "https://bugzilla.suse.com/1175882" }, { "category": "self", "summary": "SUSE Bug 1176011", "url": "https://bugzilla.suse.com/1176011" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176278", "url": "https://bugzilla.suse.com/1176278" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176482", "url": "https://bugzilla.suse.com/1176482" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176698", "url": "https://bugzilla.suse.com/1176698" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176723", "url": "https://bugzilla.suse.com/1176723" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176732", "url": "https://bugzilla.suse.com/1176732" }, { "category": "self", "summary": "SUSE Bug 1176877", "url": "https://bugzilla.suse.com/1176877" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176922", "url": "https://bugzilla.suse.com/1176922" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177027", "url": "https://bugzilla.suse.com/1177027" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177165", "url": "https://bugzilla.suse.com/1177165" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177226", "url": "https://bugzilla.suse.com/1177226" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177513", "url": "https://bugzilla.suse.com/1177513" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1178003", "url": "https://bugzilla.suse.com/1178003" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178393", "url": "https://bugzilla.suse.com/1178393" }, { "category": "self", "summary": "SUSE Bug 1178622", "url": "https://bugzilla.suse.com/1178622" }, { "category": "self", "summary": "SUSE Bug 1178765", "url": "https://bugzilla.suse.com/1178765" }, { "category": "self", "summary": "SUSE Bug 1178782", "url": "https://bugzilla.suse.com/1178782" }, { "category": "self", "summary": "SUSE Bug 1178838", "url": "https://bugzilla.suse.com/1178838" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0430 page", "url": "https://www.suse.com/security/cve/CVE-2020-0430/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14381 page", "url": "https://www.suse.com/security/cve/CVE-2020-14381/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25704 page", "url": "https://www.suse.com/security/cve/CVE-2020-25704/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27673 page", "url": "https://www.suse.com/security/cve/CVE-2020-27673/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27675 page", "url": "https://www.suse.com/security/cve/CVE-2020-27675/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-11-26T11:49:26Z", "generator": { "date": "2020-11-26T11:49:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3532-1", "initial_release_date": "2020-11-26T11:49:26Z", "revision_history": [ { "date": "2020-11-26T11:49:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.63.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150.63.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.63.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150.63.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-default-4.12.14-150.63.1.aarch64", "product_id": "kernel-default-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-150.63.1.aarch64", "product_id": "kernel-default-base-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150.63.1.aarch64", "product_id": "kernel-default-devel-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150.63.1.aarch64", "product_id": "kernel-default-extra-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150.63.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.63.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150.63.1.aarch64", "product_id": "kernel-obs-build-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150.63.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150.63.1.aarch64", "product_id": "kernel-syms-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150.63.1.aarch64", "product_id": "kernel-vanilla-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150.63.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.63.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.63.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150.63.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150.63.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150.63.1.noarch", "product": { "name": "kernel-devel-4.12.14-150.63.1.noarch", "product_id": "kernel-devel-4.12.14-150.63.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150.63.1.noarch", "product": { "name": "kernel-docs-4.12.14-150.63.1.noarch", "product_id": "kernel-docs-4.12.14-150.63.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150.63.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150.63.1.noarch", "product_id": "kernel-docs-html-4.12.14-150.63.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150.63.1.noarch", "product": { "name": "kernel-macros-4.12.14-150.63.1.noarch", "product_id": "kernel-macros-4.12.14-150.63.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150.63.1.noarch", "product": { "name": "kernel-source-4.12.14-150.63.1.noarch", "product_id": "kernel-source-4.12.14-150.63.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150.63.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150.63.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150.63.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.63.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150.63.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-150.63.1.ppc64le", "product_id": "kernel-debug-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150.63.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150.63.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.63.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-default-4.12.14-150.63.1.ppc64le", "product_id": "kernel-default-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150.63.1.ppc64le", "product_id": "kernel-default-base-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150.63.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150.63.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.63.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150.63.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150.63.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150.63.1.ppc64le", "product_id": "kernel-syms-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150.63.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150.63.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.63.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150.63.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150.63.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.63.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150.63.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.63.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150.63.1.s390x", "product_id": "dlm-kmp-default-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.63.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150.63.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.63.1.s390x", "product": { "name": "kernel-default-4.12.14-150.63.1.s390x", "product_id": "kernel-default-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.63.1.s390x", "product": { "name": "kernel-default-base-4.12.14-150.63.1.s390x", "product_id": "kernel-default-base-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.63.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-150.63.1.s390x", "product_id": "kernel-default-devel-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.63.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-150.63.1.s390x", "product_id": "kernel-default-extra-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.63.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150.63.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.63.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.63.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150.63.1.s390x", "product": { "name": "kernel-default-man-4.12.14-150.63.1.s390x", "product_id": "kernel-default-man-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.63.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-150.63.1.s390x", "product_id": "kernel-obs-build-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.63.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150.63.1.s390x", "product_id": "kernel-obs-qa-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.63.1.s390x", "product": { "name": "kernel-syms-4.12.14-150.63.1.s390x", "product_id": "kernel-syms-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.63.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-150.63.1.s390x", "product_id": "kernel-vanilla-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.63.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150.63.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.63.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150.63.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150.63.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150.63.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150.63.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150.63.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.63.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150.63.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.63.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150.63.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.63.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150.63.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.63.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150.63.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.63.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150.63.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-debug-4.12.14-150.63.1.x86_64", "product_id": "kernel-debug-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150.63.1.x86_64", "product_id": "kernel-debug-base-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150.63.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.63.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-default-4.12.14-150.63.1.x86_64", "product_id": "kernel-default-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-150.63.1.x86_64", "product_id": "kernel-default-base-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150.63.1.x86_64", "product_id": "kernel-default-devel-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150.63.1.x86_64", "product_id": "kernel-default-extra-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150.63.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.63.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150.63.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150.63.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150.63.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.63.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150.63.1.x86_64", "product_id": "kernel-obs-build-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150.63.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150.63.1.x86_64", "product_id": "kernel-syms-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150.63.1.x86_64", "product_id": "kernel-vanilla-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150.63.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.63.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.63.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150.63.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150.63.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x" }, "product_reference": "kernel-default-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0430" } ], "notes": [ { "category": "general", "text": "In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0430", "url": "https://www.suse.com/security/cve/CVE-2020-0430" }, { "category": "external", "summary": "SUSE Bug 1176723 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1176723" }, { "category": "external", "summary": "SUSE Bug 1178003 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1178003" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-0430" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-14381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14381" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14381", "url": "https://www.suse.com/security/cve/CVE-2020-14381" }, { "category": "external", "summary": "SUSE Bug 1176011 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176011" }, { "category": "external", "summary": "SUSE Bug 1176012 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-14381" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25704" } ], "notes": [ { "category": "general", "text": "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25704", "url": "https://www.suse.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "SUSE Bug 1178393 for CVE-2020-25704", "url": "https://bugzilla.suse.com/1178393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-25704" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-26088" }, { "cve": "CVE-2020-27673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27673" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27673", "url": "https://www.suse.com/security/cve/CVE-2020-27673" }, { "category": "external", "summary": "SUSE Bug 1177411 for CVE-2020-27673", "url": "https://bugzilla.suse.com/1177411" }, { "category": "external", "summary": "SUSE Bug 1184583 for CVE-2020-27673", "url": "https://bugzilla.suse.com/1184583" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-27673" }, { "cve": "CVE-2020-27675", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27675" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27675", "url": "https://www.suse.com/security/cve/CVE-2020-27675" }, { "category": "external", "summary": "SUSE Bug 1177410 for CVE-2020-27675", "url": "https://bugzilla.suse.com/1177410" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-27675" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-8694" } ] }
suse-su-2020:3512-1
Vulnerability from csaf_suse
Published
2020-11-25 09:07
Modified
2020-11-25 09:07
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 realtime kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-8694: Insufficient access control for some Intel(R) Processors may have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1170415).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bnc#1176723).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file (bsc#1177470).
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
The following non-security bugs were fixed:
- 9P: Cast to loff_t before multiplying (git-fixes).
- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).
- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).
- ACPI: dock: fix enum-conversion warning (git-fixes).
- ACPI / extlog: Check for RDMSR failure (git-fixes).
- ACPI: NFIT: Fix comparison to '-ENXIO' (git-fixes).
- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card->ctl_files_rwlock (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: Fix potential use-after-free of streams (gix-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -> 'Frequency' (git-fixes).
- arm64: Run ARCH_WORKAROUND_1 enabling code on all CPUs (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ata: sata_rcar: Fix DMA boundary mask (git-fixes).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blk-mq: order adding requests to hctx->dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi->io_pages is always initialized (bsc#1177749).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- bnxt: do not enable NAPI until rings are ready (networking-stable-20_09_11).
- bnxt_en: Check for zero dir entries in NVRAM (networking-stable-20_09_11).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: fix incorrect updating of log root tree (bsc#1177687).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: remove root usage from can_overcommit (bsc#1131277).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- btrfs: take overcommit into account in inc_block_group_ro (bsc#1176560).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).
- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).
- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).
- can: peak_usb: add range checking in decode operations (git-fixes).
- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).
- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- ceph: fix memory leak in ceph_cleanup_snapid_map() (bsc#1178234).
- ceph: map snapid to anonymous bdev ID (bsc#1178234).
- ceph: promote to unsigned long long before shifting (bsc#1178187).
- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- clk: ti: clockdomain: fix static checker warning (git-fixes).
- coredump: fix crash when umh is disabled (bsc#1177753).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ccp - fix error handling (git-fixes).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- debugfs: Fix module state check condition (git-fixes).
- device property: Do not clear secondary pointer for shared primary firmware node (git-fixes).
- device property: Keep secondary firmware node secondary by type (git-fixes).
- Disable ipa-clones dump for KMP builds (bsc#1178330)
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- dpaa_eth: fix the RX headroom size alignment (git-fixes).
- dpaa_eth: update the buffer layout for non-A050385 erratum scenarios (git-fixes).
- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).
- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).
- drm/amdgpu: do not map BO in reserved region (git-fixes).
- drm/amdgpu: prevent double kfree ttm->sg (git-fixes).
- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).
- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).
- drm/gma500: fix error check (git-fixes).
- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).
- drm/i915: Force VT'd workarounds when running as a guest OS (git-fixes).
- drm/imx: tve remove extraneous type qualifier (git-fixes).
- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/ttm: fix eviction valuable range check (git-fixes).
- drm/vc4: drv: Add error handding for bind (git-fixes).
- ea43d9709f72 ('nvme: fix identify error status silent ignore')
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1112178).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- efivarfs: Replace invalid slashes with exclamation marks in dentries (git-fixes).
- ext4: fix dir_nlink behaviour (bsc#1177359).
- Fix use after free in get_capset_info callback (git-fixes).
- ftrace: Fix recursion check for NMI test (git-fixes).
- ftrace: Handle tracing when switching between context (git-fixes).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- hv_netvsc: Add XDP support (bsc#1177819, bsc#1177820).
- hv_netvsc: Fix XDP refcnt for synthetic and VF NICs (bsc#1177819, bsc#1177820).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- ibmvnic: save changed mac address to adapter->mac_addr (bsc#1134760 ltc#177449 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio:adc:max1118 Fix alignment of timestamp and data leak issues (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- include/linux/swapops.h: correct guards for non_swap_entry() (git-fixes (mm/swap)).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (git-fixes).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- ipmi: use vzalloc instead of kmalloc for user creation (bsc#1178607).
- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).
- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- kthread_worker: prevent queuing delayed work from timer_fn when it is being canceled (git-fixes).
- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).
- leds: mt6323: move period calculation (git-fixes).
- libceph: clear con->out_msg on Policy::stateful_server faults (bsc#1178188).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- livepatch: Test if -fdump-ipa-clones is really available As of now we add -fdump-ipa-clones unconditionally.
- mac80211: handle lack of sband->bitrates in rates (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: platform: Improve queue set up flow for bug fixing (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (bsc#1177703).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mlx5 PPC ringsize workaround (bsc#1173432).
- mlx5: remove support for ib_get_vector_affinity (bsc#1174748).
- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm: hugetlb: switch to css_tryget() in hugetlb_cgroup_charge_cgroup() (git-fixes (mm/hugetlb)).
- mm/ksm.c: do not WARN if page is still mapped in remove_stable_node() (git-fixes (mm/hugetlb)).
- mm/memcg: fix refcount error while moving and swapping (bsc#1178686).
- mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm() (bsc#1177685).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/mempolicy.c: use match_string() helper to simplify the code (git-fixes (mm/mempolicy)).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (git-fixes (mm/numa)).
- mm/page_owner.c: remove drain_all_pages from init_early_allocated_pages (git-fixes (mm/debug)).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm/page-writeback.c: use div64_ul() for u64-by-unsigned-long divide (git-fixes (mm/writeback)).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm/zsmalloc.c: fix build when CONFIG_COMPACTION=n (git-fixes (mm/zsmalloc)).
- mm/zsmalloc.c: fix race condition in zs_destroy_pool (git-fixes (mm/zsmalloc)).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- mm/zsmalloc.c: migration can leave pages in ZS_EMPTY indefinitely (git-fixes (mm/zsmalloc)).
- Move the upstreamed bluetooth fix into sorted section
- Move the upstreamed powercap fix into sorted sectio
- Move upstreamed patches into sorted section
- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).
- net: Fix potential wrong skb->protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- net/mlx5e: Take common TIR context settings into a function (bsc#1177740).
- net/mlx5e: Turn on HW tunnel offload in all TIRs (bsc#1177740).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- nvme: add a Identify Namespace Identification Descriptor list quirk (bsc#1174748).
- nvme: do not update disk info for multipathed device (bsc#1171558).
- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1174748).
- nvme: fix deadlock caused by ANA update wrong locking (bsc#1174748).
- nvme: fix possible hang when ns scanning fails during error recovery
- nvme: fix possible io failures when removing multipathed ns (bsc#1174748).
- nvme: make nvme_identify_ns propagate errors back (bsc#1174748).
- nvme: make nvme_report_ns_ids propagate error back (bsc#1174748).
- nvme-multipath: do not reset on unknown status (bsc#1174748).
- nvme: Namepace identification descriptor list is optional (bsc#1174748).
- nvme: pass status to nvme_error_status (bsc#1174748).
- nvme-rdma: Avoid double freeing of async event data (bsc#1174748).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- nvme: return error from nvme_alloc_ns() (bsc#1174748).
- ocfs2: fix unbalanced locking (git-fixes).
- p54: avoid accessing the data mapped to streaming DMA (git-fixes).
- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1114648).
- perf/x86: Fix n_pair for cancelled txn (bsc#1114648).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- powerpc: Fix circular dependency between percpu.h and mmu.h (git-fixes).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries/cpuidle: add polling idle for shared processor guests (bsc#1178765 ltc#188968).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- powerpc/vnic: Extend 'failover pending' window (bsc#1176855 ltc#187293).
- powerpc/vnic: Extend 'failover pending' window (bsc#1176855 ltc#187293).
- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).
- pty: do tty_flip_buffer_push without port->lock in pty_write (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- ring-buffer: Fix recursion protection transitions between interrupt context (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtl8xxxu: prevent potential memory leak (git-fixes).
- scsi: hisi_sas: Add debugfs ITCT file and add file operations (bsc#1140683).
- scsi: hisi_sas: Add manual trigger for debugfs dump (bsc#1140683).
- scsi: hisi_sas: Add missing seq_printf() call in hisi_sas_show_row_32() (bsc#1140683).
- scsi: hisi_sas: Change return variable type in phy_up_v3_hw() (bsc#1140683).
- scsi: hisi_sas: Correct memory allocation size for DQ debugfs (bsc#1140683).
- scsi: hisi_sas: Do some more tidy-up (bsc#1140683).
- scsi: hisi_sas: Fix a timeout race of driver internal and SMP IO (bsc#1140683).
- scsi: hisi_sas: Fix type casting and missing static qualifier in debugfs code (bsc#1140683). Refresh:
- scsi: hisi_sas: No need to check return value of debugfs_create functions (bsc#1140683). Update:
- scsi: hisi_sas: Some misc tidy-up (bsc#1140683).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).
- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).
- staging: octeon: repair 'fixed-link' support (git-fixes).
- tg3: Fix soft lockup when tg3_reset_task() fails (networking-stable-20_09_11).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb->data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: earlycon dependency (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- USB: Add NO_LPM quirk for Kingston flash drive (git-fixes).
- USB: adutux: fix debugging (git-fixes).
- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- usb: cdc-acm: fix cooldown mechanism (git-fixes).
- USB: cdc-acm: handle broken union descriptors (git-fixes).
- USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- usb: core: Solve race condition in anchor cleanup functions (git-fixes).
- usb: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- usb: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- usb: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- usb: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- usb: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- usb: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- usb: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- usb: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).
- usb: host: xhci: fix ep context print mismatch in debugfs (git-fixes).
- usb: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).
- usb: ohci: Default to per-port over-current protection (git-fixes).
- USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231 (git-fixes).
- USB: serial: option: add Quectel EC200T module support (git-fixes).
- USB: serial: option: add Telit FN980 composition 0x1055 (git-fixes).
- USB: serial: qcserial: fix altsetting probing (git-fixes).
- usb: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).
- usb: typec: tcpm: reset hard_reset_count for any disconnect (git-fixes).
- vfs: fix FIGETBSZ ioctl on an overlayfs file (bsc#1178202).
- video: fbdev: pvr2fb: initialize variables (git-fixes).
- video: fbdev: sis: fix null ptr dereference (git-fixes).
- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- vt: Disable KD_FONT_OP_COPY (bsc#1178589).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: iTCO_wdt: Export vendorsupport (bsc#1177101).
- watchdog: iTCO_wdt: Make ICH_RES_IO_SMI optional (bsc#1177101).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode->i_io_list with inode->i_lock (bsc#1177755).
- x86/apic: Unify duplicated local apic timer clockevent initialization (bsc#1112178).
- x86, fakenuma: Fix invalid starting node ID (git-fixes (mm/x86/fakenuma)).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1112178).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1058115 bsc#1176907).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
- xfs: avoid infinite loop when cancelling CoW blocks after writeback failure (bsc#1178027).
- xfs: do not update mtime on COW faults (bsc#1167030).
- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).
- xfs: limit entries returned when counting fsmap records (git-fixes).
- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).
Patchnames
SUSE-2020-3512,SUSE-SLE-RT-12-SP5-2020-3512
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 realtime kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).\n- CVE-2020-8694: Insufficient access control for some Intel(R) Processors may have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1170415).\n- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).\n- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).\n- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).\n- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bnc#1176723).\n- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).\n- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file (bsc#1177470).\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 (bsc#1177725).\n\nThe following non-security bugs were fixed:\n\n- 9P: Cast to loff_t before multiplying (git-fixes).\n- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).\n- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).\n- ACPI: dock: fix enum-conversion warning (git-fixes).\n- ACPI / extlog: Check for RDMSR failure (git-fixes).\n- ACPI: NFIT: Fix comparison to \u0027-ENXIO\u0027 (git-fixes).\n- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).\n- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).\n- ALSA: compress_offload: remove redundant initialization (git-fixes).\n- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).\n- ALSA: core: pcm: simplify locking for timers (git-fixes).\n- ALSA: core: timer: clarify operator precedence (git-fixes).\n- ALSA: core: timer: remove redundant assignment (git-fixes).\n- ALSA: ctl: Workaround for lockdep warning wrt card-\u003ectl_files_rwlock (git-fixes).\n- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).\n- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).\n- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).\n- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).\n- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).\n- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).\n- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).\n- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).\n- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).\n- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).\n- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).\n- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).\n- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).\n- ALSA: usb-audio: endpoint.c: fix repeated word \u0027there\u0027 (git-fixes).\n- ALSA: usb-audio: Fix potential use-after-free of streams (gix-fixes).\n- ALSA: usb-audio: fix spelling mistake \u0027Frequence\u0027 -\u003e \u0027Frequency\u0027 (git-fixes).\n- arm64: Run ARCH_WORKAROUND_1 enabling code on all CPUs (git-fixes).\n- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).\n- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).\n- ata: sata_rcar: Fix DMA boundary mask (git-fixes).\n- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).\n- ath10k: Fix the size used in a \u0027dma_free_coherent()\u0027 call in an error handling path (git-fixes).\n- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).\n- ath10k: provide survey info as accumulated data (git-fixes).\n- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).\n- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).\n- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).\n- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).\n- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).\n- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).\n- blk-mq: order adding requests to hctx-\u003edispatch and checking SCHED_RESTART (bsc#1177750).\n- block: ensure bdi-\u003eio_pages is always initialized (bsc#1177749).\n- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).\n- Bluetooth: Only mark socket zapped after unlocking (git-fixes).\n- bnxt: do not enable NAPI until rings are ready (networking-stable-20_09_11).\n- bnxt_en: Check for zero dir entries in NVRAM (networking-stable-20_09_11).\n- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).\n- brcmfmac: check ndev pointer (git-fixes).\n- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).\n- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).\n- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).\n- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).\n- btrfs: fix incorrect updating of log root tree (bsc#1177687).\n- btrfs: fix race between page release and a fast fsync (bsc#1177687).\n- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).\n- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).\n- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).\n- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).\n- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).\n- btrfs: release old extent maps during page release (bsc#1177687).\n- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).\n- btrfs: remove root usage from can_overcommit (bsc#1131277).\n- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).\n- btrfs: take overcommit into account in inc_block_group_ro (bsc#1176560).\n- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).\n- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).\n- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).\n- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).\n- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).\n- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).\n- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).\n- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).\n- can: peak_usb: add range checking in decode operations (git-fixes).\n- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).\n- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).\n- can: softing: softing_card_shutdown(): add braces around empty body in an \u0027if\u0027 statement (git-fixes).\n- ceph: fix memory leak in ceph_cleanup_snapid_map() (bsc#1178234).\n- ceph: map snapid to anonymous bdev ID (bsc#1178234).\n- ceph: promote to unsigned long long before shifting (bsc#1178187).\n- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).\n- clk: at91: remove the checking of parent_name (git-fixes).\n- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).\n- clk: imx8mq: Fix usdhc parents order (git-fixes).\n- clk: ti: clockdomain: fix static checker warning (git-fixes).\n- coredump: fix crash when umh is disabled (bsc#1177753).\n- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).\n- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).\n- crypto: ccp - fix error handling (git-fixes).\n- crypto: ixp4xx - Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).\n- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).\n- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).\n- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).\n- debugfs: Fix module state check condition (git-fixes).\n- device property: Do not clear secondary pointer for shared primary firmware node (git-fixes).\n- device property: Keep secondary firmware node secondary by type (git-fixes).\n- Disable ipa-clones dump for KMP builds (bsc#1178330)\n- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).\n- dpaa_eth: fix the RX headroom size alignment (git-fixes).\n- dpaa_eth: update the buffer layout for non-A050385 erratum scenarios (git-fixes).\n- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).\n- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).\n- drm/amdgpu: do not map BO in reserved region (git-fixes).\n- drm/amdgpu: prevent double kfree ttm-\u003esg (git-fixes).\n- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).\n- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).\n- drm/gma500: fix error check (git-fixes).\n- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).\n- drm/i915: Force VT\u0027d workarounds when running as a guest OS (git-fixes).\n- drm/imx: tve remove extraneous type qualifier (git-fixes).\n- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (git-fixes).\n- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).\n- drm/ttm: fix eviction valuable range check (git-fixes).\n- drm/vc4: drv: Add error handding for bind (git-fixes).\n- ea43d9709f72 (\u0027nvme: fix identify error status silent ignore\u0027)\n- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1112178).\n- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).\n- efivarfs: Replace invalid slashes with exclamation marks in dentries (git-fixes).\n- ext4: fix dir_nlink behaviour (bsc#1177359).\n- Fix use after free in get_capset_info callback (git-fixes).\n- ftrace: Fix recursion check for NMI test (git-fixes).\n- ftrace: Handle tracing when switching between context (git-fixes).\n- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).\n- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).\n- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).\n- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).\n- hv_netvsc: Add XDP support (bsc#1177819, bsc#1177820).\n- hv_netvsc: Fix XDP refcnt for synthetic and VF NICs (bsc#1177819, bsc#1177820).\n- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).\n- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).\n- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).\n- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).\n- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).\n- ibmvnic: save changed mac address to adapter-\u003emac_addr (bsc#1134760 ltc#177449 git-fixes).\n- icmp: randomize the global rate limiter (git-fixes).\n- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).\n- iio:adc:max1118 Fix alignment of timestamp and data leak issues (git-fixes).\n- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).\n- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).\n- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).\n- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).\n- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).\n- include/linux/swapops.h: correct guards for non_swap_entry() (git-fixes (mm/swap)).\n- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (git-fixes).\n- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).\n- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).\n- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).\n- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).\n- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).\n- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).\n- ipmi: use vzalloc instead of kmalloc for user creation (bsc#1178607).\n- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).\n- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).\n- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).\n- kbuild: enforce -Werror=return-type (bsc#1177281).\n- kthread_worker: prevent queuing delayed work from timer_fn when it is being canceled (git-fixes).\n- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).\n- leds: mt6323: move period calculation (git-fixes).\n- libceph: clear con-\u003eout_msg on Policy::stateful_server faults (bsc#1178188).\n- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).\n- livepatch: Test if -fdump-ipa-clones is really available As of now we add -fdump-ipa-clones unconditionally.\n- mac80211: handle lack of sband-\u003ebitrates in rates (git-fixes).\n- mailbox: avoid timer start from callback (git-fixes).\n- media: ati_remote: sanity check for both endpoints (git-fixes).\n- media: bdisp: Fix runtime PM imbalance on error (git-fixes).\n- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).\n- media: exynos4-is: Fix a reference count leak (git-fixes).\n- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).\n- media: firewire: fix memory leak (git-fixes).\n- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).\n- media: media/pci: prevent memory leak in bttv_probe (git-fixes).\n- media: omap3isp: Fix memleak in isp_probe (git-fixes).\n- media: platform: fcp: Fix a reference count leak (git-fixes).\n- media: platform: Improve queue set up flow for bug fixing (git-fixes).\n- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).\n- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).\n- media: Revert \u0027media: exynos4-is: Add missed check for pinctrl_lookup_state()\u0027 (git-fixes).\n- media: s5p-mfc: Fix a reference count leak (git-fixes).\n- media: saa7134: avoid a shift overflow (git-fixes).\n- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).\n- media: sti: Fix reference count leaks (git-fixes).\n- media: tc358743: initialize variable (git-fixes).\n- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).\n- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).\n- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).\n- media: usbtv: Fix refcounting mixup (git-fixes).\n- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).\n- media: vsp1: Fix runtime PM imbalance on error (git-fixes).\n- memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (bsc#1177703).\n- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).\n- memory: omap-gpmc: Fix a couple off by ones (git-fixes).\n- mfd: sm501: Fix leaks in probe() (git-fixes).\n- mic: vop: copy data to kernel space then write to io memory (git-fixes).\n- misc: mic: scif: Fix error handling path (git-fixes).\n- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).\n- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).\n- mlx5 PPC ringsize workaround (bsc#1173432).\n- mlx5: remove support for ib_get_vector_affinity (bsc#1174748).\n- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).\n- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).\n- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).\n- mm: hugetlb: switch to css_tryget() in hugetlb_cgroup_charge_cgroup() (git-fixes (mm/hugetlb)).\n- mm/ksm.c: do not WARN if page is still mapped in remove_stable_node() (git-fixes (mm/hugetlb)).\n- mm/memcg: fix refcount error while moving and swapping (bsc#1178686).\n- mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm() (bsc#1177685).\n- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).\n- mm/mempolicy.c: use match_string() helper to simplify the code (git-fixes (mm/mempolicy)).\n- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (git-fixes (mm/numa)).\n- mm/page_owner.c: remove drain_all_pages from init_early_allocated_pages (git-fixes (mm/debug)).\n- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).\n- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).\n- mm/page-writeback.c: use div64_ul() for u64-by-unsigned-long divide (git-fixes (mm/writeback)).\n- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).\n- mm/zsmalloc.c: fix build when CONFIG_COMPACTION=n (git-fixes (mm/zsmalloc)).\n- mm/zsmalloc.c: fix race condition in zs_destroy_pool (git-fixes (mm/zsmalloc)).\n- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).\n- mm/zsmalloc.c: migration can leave pages in ZS_EMPTY indefinitely (git-fixes (mm/zsmalloc)).\n- Move the upstreamed bluetooth fix into sorted section\n- Move the upstreamed powercap fix into sorted sectio\n- Move upstreamed patches into sorted section\n- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).\n- mtd: lpddr: fix excessive stack usage with clang (git-fixes).\n- mtd: mtdoops: Do not write panic data twice (git-fixes).\n- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).\n- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).\n- mwifiex: fix double free (git-fixes).\n- mwifiex: remove function pointer check (git-fixes).\n- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).\n- net: disable netpoll on fresh napis (networking-stable-20_09_11).\n- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).\n- net: Fix potential wrong skb-\u003eprotocol in skb_vlan_untag() (networking-stable-20_08_24).\n- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).\n- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).\n- netlabel: fix problems with mapping removal (networking-stable-20_09_11).\n- net/mlx5e: Take common TIR context settings into a function (bsc#1177740).\n- net/mlx5e: Turn on HW tunnel offload in all TIRs (bsc#1177740).\n- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).\n- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).\n- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).\n- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).\n- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).\n- net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition (git-fixes).\n- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).\n- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).\n- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).\n- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix non-split wiphy information (git-fixes).\n- NTB: hw: amd: fix an issue about leak system resources (git-fixes).\n- nvme: add a Identify Namespace Identification Descriptor list quirk (bsc#1174748).\n- nvme: do not update disk info for multipathed device (bsc#1171558).\n- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1174748).\n- nvme: fix deadlock caused by ANA update wrong locking (bsc#1174748).\n- nvme: fix possible hang when ns scanning fails during error recovery\n- nvme: fix possible io failures when removing multipathed ns (bsc#1174748).\n- nvme: make nvme_identify_ns propagate errors back (bsc#1174748).\n- nvme: make nvme_report_ns_ids propagate error back (bsc#1174748).\n- nvme-multipath: do not reset on unknown status (bsc#1174748).\n- nvme: Namepace identification descriptor list is optional (bsc#1174748).\n- nvme: pass status to nvme_error_status (bsc#1174748).\n- nvme-rdma: Avoid double freeing of async event data (bsc#1174748).\n- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).\n- nvme-rdma: fix crash when connect rejected (bsc#1174748).\n- nvme: return error from nvme_alloc_ns() (bsc#1174748).\n- ocfs2: fix unbalanced locking (git-fixes).\n- p54: avoid accessing the data mapped to streaming DMA (git-fixes).\n- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1114648).\n- perf/x86: Fix n_pair for cancelled txn (bsc#1114648).\n- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).\n- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).\n- powerpc: Fix circular dependency between percpu.h and mmu.h (git-fixes).\n- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).\n- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).\n- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).\n- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).\n- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).\n- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).\n- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).\n- powerpc/pseries/cpuidle: add polling idle for shared processor guests (bsc#1178765 ltc#188968).\n- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).\n- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).\n- powerpc/vnic: Extend \u0027failover pending\u0027 window (bsc#1176855 ltc#187293).\n- powerpc/vnic: Extend \u0027failover pending\u0027 window (bsc#1176855 ltc#187293).\n- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).\n- pty: do tty_flip_buffer_push without port-\u003elock in pty_write (git-fixes).\n- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).\n- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).\n- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).\n- regulator: resolve supply after creating regulator (git-fixes).\n- ring-buffer: Fix recursion protection transitions between interrupt context (git-fixes).\n- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).\n- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)\n- rtl8xxxu: prevent potential memory leak (git-fixes).\n- scsi: hisi_sas: Add debugfs ITCT file and add file operations (bsc#1140683).\n- scsi: hisi_sas: Add manual trigger for debugfs dump (bsc#1140683).\n- scsi: hisi_sas: Add missing seq_printf() call in hisi_sas_show_row_32() (bsc#1140683).\n- scsi: hisi_sas: Change return variable type in phy_up_v3_hw() (bsc#1140683).\n- scsi: hisi_sas: Correct memory allocation size for DQ debugfs (bsc#1140683).\n- scsi: hisi_sas: Do some more tidy-up (bsc#1140683).\n- scsi: hisi_sas: Fix a timeout race of driver internal and SMP IO (bsc#1140683).\n- scsi: hisi_sas: Fix type casting and missing static qualifier in debugfs code (bsc#1140683). Refresh:\n- scsi: hisi_sas: No need to check return value of debugfs_create functions (bsc#1140683). Update:\n- scsi: hisi_sas: Some misc tidy-up (bsc#1140683).\n- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).\n- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).\n- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).\n- spi: fsl-espi: Only process interrupts for expected events (git-fixes).\n- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).\n- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).\n- staging: octeon: repair \u0027fixed-link\u0027 support (git-fixes).\n- tg3: Fix soft lockup when tg3_reset_task() fails (networking-stable-20_09_11).\n- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).\n- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).\n- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).\n- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).\n- tipc: fix uninit skb-\u003edata in tipc_nl_compat_dumpit() (networking-stable-20_08_24).\n- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).\n- tty: ipwireless: fix error handling (git-fixes).\n- tty: serial: earlycon dependency (git-fixes).\n- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).\n- USB: Add NO_LPM quirk for Kingston flash drive (git-fixes).\n- USB: adutux: fix debugging (git-fixes).\n- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).\n- usb: cdc-acm: fix cooldown mechanism (git-fixes).\n- USB: cdc-acm: handle broken union descriptors (git-fixes).\n- USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).\n- usb: core: Solve race condition in anchor cleanup functions (git-fixes).\n- usb: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).\n- usb: dwc2: Fix parameter type in function pointer prototype (git-fixes).\n- usb: dwc3: core: add phy cleanup for probe error handling (git-fixes).\n- usb: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).\n- usb: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).\n- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).\n- usb: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).\n- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).\n- usb: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).\n- usb: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).\n- usb: host: xhci: fix ep context print mismatch in debugfs (git-fixes).\n- usb: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).\n- usb: ohci: Default to per-port over-current protection (git-fixes).\n- USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231 (git-fixes).\n- USB: serial: option: add Quectel EC200T module support (git-fixes).\n- USB: serial: option: add Telit FN980 composition 0x1055 (git-fixes).\n- USB: serial: qcserial: fix altsetting probing (git-fixes).\n- usb: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).\n- usb: typec: tcpm: reset hard_reset_count for any disconnect (git-fixes).\n- vfs: fix FIGETBSZ ioctl on an overlayfs file (bsc#1178202).\n- video: fbdev: pvr2fb: initialize variables (git-fixes).\n- video: fbdev: sis: fix null ptr dereference (git-fixes).\n- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).\n- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).\n- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).\n- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).\n- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).\n- vt: Disable KD_FONT_OP_COPY (bsc#1178589).\n- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).\n- watchdog: iTCO_wdt: Export vendorsupport (bsc#1177101).\n- watchdog: iTCO_wdt: Make ICH_RES_IO_SMI optional (bsc#1177101).\n- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).\n- writeback: Avoid skipping inode writeback (bsc#1177755).\n- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).\n- writeback: Protect inode-\u003ei_io_list with inode-\u003ei_lock (bsc#1177755).\n- x86/apic: Unify duplicated local apic timer clockevent initialization (bsc#1112178).\n- x86, fakenuma: Fix invalid starting node ID (git-fixes (mm/x86/fakenuma)).\n- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1112178).\n- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).\n- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1058115 bsc#1176907).\n- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).\n- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/events: add a new \u0027late EOI\u0027 evtchn framework (XSA-332 bsc#1177411).\n- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).\n- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).\n- xen/events: block rogue events for some time (XSA-332 bsc#1177411).\n- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).\n- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).\n- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).\n- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).\n- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).\n- xen/gntdev.c: Mark pages as dirty (bsc#1065600).\n- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).\n- xfs: avoid infinite loop when cancelling CoW blocks after writeback failure (bsc#1178027).\n- xfs: do not update mtime on COW faults (bsc#1167030).\n- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).\n- xfs: limit entries returned when counting fsmap records (git-fixes).\n- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3512,SUSE-SLE-RT-12-SP5-2020-3512", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3512-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3512-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203512-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3512-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" }, { "category": "self", "summary": "SUSE Bug 1055014", "url": "https://bugzilla.suse.com/1055014" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1061843", "url": "https://bugzilla.suse.com/1061843" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066382", "url": "https://bugzilla.suse.com/1066382" }, { "category": "self", "summary": "SUSE Bug 1077428", "url": "https://bugzilla.suse.com/1077428" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1114648", "url": "https://bugzilla.suse.com/1114648" }, { "category": "self", "summary": "SUSE Bug 1131277", "url": "https://bugzilla.suse.com/1131277" }, { "category": "self", "summary": "SUSE Bug 1134760", "url": "https://bugzilla.suse.com/1134760" }, { "category": "self", "summary": "SUSE Bug 1140683", "url": "https://bugzilla.suse.com/1140683" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1157424", "url": "https://bugzilla.suse.com/1157424" }, { "category": "self", "summary": "SUSE Bug 1163592", "url": "https://bugzilla.suse.com/1163592" }, { "category": "self", "summary": "SUSE Bug 1167030", "url": "https://bugzilla.suse.com/1167030" }, { "category": "self", "summary": "SUSE Bug 1170415", "url": "https://bugzilla.suse.com/1170415" }, { "category": "self", "summary": "SUSE Bug 1170446", "url": "https://bugzilla.suse.com/1170446" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1172757", "url": "https://bugzilla.suse.com/1172757" }, { "category": "self", "summary": "SUSE Bug 1173432", "url": "https://bugzilla.suse.com/1173432" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1175306", "url": "https://bugzilla.suse.com/1175306" }, { "category": "self", "summary": "SUSE Bug 1175520", "url": "https://bugzilla.suse.com/1175520" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1176354", "url": "https://bugzilla.suse.com/1176354" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176560", "url": "https://bugzilla.suse.com/1176560" }, { "category": "self", "summary": "SUSE Bug 1176713", "url": "https://bugzilla.suse.com/1176713" }, { "category": "self", "summary": "SUSE Bug 1176723", "url": "https://bugzilla.suse.com/1176723" }, { "category": "self", "summary": "SUSE Bug 1176855", "url": "https://bugzilla.suse.com/1176855" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176946", "url": "https://bugzilla.suse.com/1176946" }, { "category": "self", "summary": "SUSE Bug 1176983", "url": "https://bugzilla.suse.com/1176983" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177101", "url": "https://bugzilla.suse.com/1177101" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177281", "url": "https://bugzilla.suse.com/1177281" }, { "category": "self", "summary": "SUSE Bug 1177359", "url": "https://bugzilla.suse.com/1177359" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177685", "url": "https://bugzilla.suse.com/1177685" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177703", "url": "https://bugzilla.suse.com/1177703" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177729", "url": "https://bugzilla.suse.com/1177729" }, { "category": "self", "summary": "SUSE Bug 1177740", "url": "https://bugzilla.suse.com/1177740" }, { "category": "self", "summary": "SUSE Bug 1177749", "url": "https://bugzilla.suse.com/1177749" }, { "category": "self", "summary": "SUSE Bug 1177750", "url": "https://bugzilla.suse.com/1177750" }, { "category": "self", "summary": "SUSE Bug 1177753", "url": "https://bugzilla.suse.com/1177753" }, { "category": "self", "summary": "SUSE Bug 1177754", "url": "https://bugzilla.suse.com/1177754" }, { "category": "self", "summary": "SUSE Bug 1177755", "url": "https://bugzilla.suse.com/1177755" }, { "category": "self", "summary": "SUSE Bug 1177762", "url": "https://bugzilla.suse.com/1177762" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177819", "url": "https://bugzilla.suse.com/1177819" }, { "category": "self", "summary": "SUSE Bug 1177820", "url": "https://bugzilla.suse.com/1177820" }, { "category": "self", "summary": "SUSE Bug 1177855", "url": "https://bugzilla.suse.com/1177855" }, { "category": "self", "summary": "SUSE Bug 1177856", "url": "https://bugzilla.suse.com/1177856" }, { "category": "self", "summary": "SUSE Bug 1177861", "url": "https://bugzilla.suse.com/1177861" }, { "category": "self", "summary": "SUSE Bug 1178003", "url": "https://bugzilla.suse.com/1178003" }, { "category": "self", "summary": "SUSE Bug 1178027", "url": "https://bugzilla.suse.com/1178027" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178166", "url": "https://bugzilla.suse.com/1178166" }, { "category": "self", "summary": "SUSE Bug 1178185", "url": "https://bugzilla.suse.com/1178185" }, { "category": "self", "summary": "SUSE Bug 1178187", "url": "https://bugzilla.suse.com/1178187" }, { "category": "self", "summary": "SUSE Bug 1178188", "url": "https://bugzilla.suse.com/1178188" }, { "category": "self", "summary": "SUSE Bug 1178202", "url": "https://bugzilla.suse.com/1178202" }, { "category": "self", "summary": "SUSE Bug 1178234", "url": "https://bugzilla.suse.com/1178234" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178393", "url": "https://bugzilla.suse.com/1178393" }, { "category": "self", "summary": "SUSE Bug 1178589", "url": "https://bugzilla.suse.com/1178589" }, { "category": "self", "summary": "SUSE Bug 1178591", "url": "https://bugzilla.suse.com/1178591" }, { "category": "self", "summary": "SUSE Bug 1178607", "url": "https://bugzilla.suse.com/1178607" }, { "category": "self", "summary": "SUSE Bug 1178622", "url": "https://bugzilla.suse.com/1178622" }, { "category": "self", "summary": "SUSE Bug 1178686", "url": "https://bugzilla.suse.com/1178686" }, { "category": "self", "summary": "SUSE Bug 1178700", "url": "https://bugzilla.suse.com/1178700" }, { "category": "self", "summary": "SUSE Bug 1178765", "url": "https://bugzilla.suse.com/1178765" }, { "category": "self", "summary": "SUSE Bug 1178782", "url": "https://bugzilla.suse.com/1178782" }, { "category": "self", "summary": "SUSE Bug 927455", "url": "https://bugzilla.suse.com/927455" }, { "category": "self", "summary": "SUSE Bug 936888", "url": "https://bugzilla.suse.com/936888" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0430 page", "url": "https://www.suse.com/security/cve/CVE-2020-0430/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25704 page", "url": "https://www.suse.com/security/cve/CVE-2020-25704/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-11-25T09:07:06Z", "generator": { "date": "2020-11-25T09:07:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3512-1", "initial_release_date": "2020-11-25T09:07:06Z", "revision_history": [ { "date": "2020-11-25T09:07:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-10.22.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-10.22.1.noarch", "product_id": "kernel-devel-rt-4.12.14-10.22.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-10.22.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-10.22.1.noarch", "product_id": "kernel-source-rt-4.12.14-10.22.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-10.22.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-10.22.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-10.22.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-10.22.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-10.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-10.22.1.x86_64", "product": { "name": "kernel-rt-4.12.14-10.22.1.x86_64", "product_id": "kernel-rt-4.12.14-10.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-10.22.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-10.22.1.x86_64", "product_id": "kernel-rt-base-4.12.14-10.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-10.22.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-10.22.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-10.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-10.22.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-10.22.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-10.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-10.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-10.22.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-10.22.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-10.22.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-10.22.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-10.22.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP5", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-10.22.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-10.22.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-10.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-10.22.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-10.22.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-10.22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-10.22.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-10.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-10.22.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-10.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-10.22.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-10.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-4.12.14-10.22.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64" }, "product_reference": "kernel-rt_debug-4.12.14-10.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-10.22.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-10.22.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-10.22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-10.22.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-10.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-10.22.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-10.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0430" } ], "notes": [ { "category": "general", "text": "In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0430", "url": "https://www.suse.com/security/cve/CVE-2020-0430" }, { "category": "external", "summary": "SUSE Bug 1176723 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1176723" }, { "category": "external", "summary": "SUSE Bug 1178003 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1178003" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:07:06Z", "details": "important" } ], "title": "CVE-2020-0430" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:07:06Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:07:06Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:07:06Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:07:06Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:07:06Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:07:06Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:07:06Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25704" } ], "notes": [ { "category": "general", "text": "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25704", "url": "https://www.suse.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "SUSE Bug 1178393 for CVE-2020-25704", "url": "https://bugzilla.suse.com/1178393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:07:06Z", "details": "moderate" } ], "title": "CVE-2020-25704" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:07:06Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.22.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.22.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T09:07:06Z", "details": "moderate" } ], "title": "CVE-2020-8694" } ] }
suse-su-2020:3389-1
Vulnerability from csaf_suse
Published
2020-11-19 10:45
Modified
2020-11-19 10:45
Summary
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2)
Description of the patch
This update for the Linux Kernel 5.3.18-22 fixes several issues.
The following security issues were fixed:
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724, bsc#1177729, bsc#1178397).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726, bsc#1177727).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
Patchnames
SUSE-2020-3389,SUSE-SLE-Module-Live-Patching-15-SP2-2020-3389,SUSE-SLE-Module-Live-Patching-15-SP2-2020-3390
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-22 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724, bsc#1177729, bsc#1178397).\n- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka \u0027BleedingTooth\u0027 aka \u0027BadVibes\u0027 (bsc#1177726, bsc#1177727).\n- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3389,SUSE-SLE-Module-Live-Patching-15-SP2-2020-3389,SUSE-SLE-Module-Live-Patching-15-SP2-2020-3390", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3389-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3389-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203389-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3389-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007798.html" }, { "category": "self", "summary": "SUSE Bug 1177513", "url": "https://bugzilla.suse.com/1177513" }, { "category": "self", "summary": "SUSE Bug 1177727", "url": "https://bugzilla.suse.com/1177727" }, { "category": "self", "summary": "SUSE Bug 1177729", "url": "https://bugzilla.suse.com/1177729" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" } ], "title": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2)", "tracking": { "current_release_date": "2020-11-19T10:45:06Z", "generator": { "date": "2020-11-19T10:45:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3389-1", "initial_release_date": "2020-11-19T10:45:06Z", "revision_history": [ { "date": "2020-11-19T10:45:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-22-default-4-11.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-22-default-4-11.2.s390x", "product_id": "kernel-livepatch-5_3_18-22-default-4-11.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_9-preempt-4-2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_9-preempt-4-2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_9-preempt-4-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-22-default-4-11.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-22-default-4-11.2.x86_64", "product_id": "kernel-livepatch-5_3_18-22-default-4-11.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-22-default-4-11.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-22-default-4-11.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-22-default-4-11.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-22-default-4-11.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-22-default-4-11.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-22-default-4-11.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-22-default-4-11.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-22-default-4-11.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-19T10:45:06Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-19T10:45:06Z", "details": "important" } ], "title": "CVE-2020-24490" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-4-11.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-19T10:45:06Z", "details": "important" } ], "title": "CVE-2020-25645" } ] }
suse-su-2020:3544-1
Vulnerability from csaf_suse
Published
2020-11-26 15:53
Modified
2020-11-26 15:53
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bug fixes.
The following security bugs were fixed:
- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bnc#1178123).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bnc#1176723).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-16120: Fixed a permissions issue in ovl_path_open() (bsc#1177470).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-12351: Implemented a kABI workaround for bluetooth l2cap_ops filter addition (bsc#1177724).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25212: Fixed a TOCTOU mismatch in the NFS client code (bnc#1176381).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).
- CVE-2020-14381: Fixed a UAF in the fast user mutex (futex) wait operation (bsc#1176011).
- CVE-2020-25643: Fixed an improper input validation in the ppp_cp_parse_cr function of the HDLC_PPP module (bnc#1177206).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)
- CVE-2020-27675: Fixed a race condition in event handler which may crash dom0 (XSA-331 bsc#1177410).
The following non-security bugs were fixed:
- btrfs: remove root usage from can_overcommit (bsc#1131277).
- hv: vmbus: Add timeout to vmbus_wait_for_unload (bsc#1177816).
- hyperv_fb: disable superfluous VERSION_WIN10_V5 case (bsc#1175306).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- livepatch: Add -fdump-ipa-clones to build (). Add support for -fdump-ipa-clones GCC option. Update config files accordingly.
- livepatch: Test if -fdump-ipa-clones is really available As of now we add -fdump-ipa-clones unconditionally. It does not cause a trouble if the kernel is build with the supported toolchain. Otherwise it could fail easily. Do the correct thing and test for the availability.
- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).
- NFS: only invalidate dentrys that are clearly invalid (bsc#1178669 bsc#1170139).
- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).
- NFSv4: do not mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).
- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).
- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).
- powerpc/pseries/cpuidle: add polling idle for shared processor guests (bsc#1178765 ltc#188968).
- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).
- scsi: fnic: Do not call 'scsi_done()' for unhandled commands (bsc#1168468, bsc#1171675).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1173233).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1173233).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
Patchnames
SUSE-2020-3544,SUSE-OpenStack-Cloud-9-2020-3544,SUSE-OpenStack-Cloud-Crowbar-9-2020-3544,SUSE-SLE-HA-12-SP4-2020-3544,SUSE-SLE-Live-Patching-12-SP4-2020-3544,SUSE-SLE-SAP-12-SP4-2020-3544,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3544
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bug fixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).\n- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).\n- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bnc#1178123).\n- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).\n- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).\n- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bnc#1176723).\n- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).\n- CVE-2020-16120: Fixed a permissions issue in ovl_path_open() (bsc#1177470).\n- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).\n- CVE-2020-12351: Implemented a kABI workaround for bluetooth l2cap_ops filter addition (bsc#1177724).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 (bsc#1177725).\n- CVE-2020-25212: Fixed a TOCTOU mismatch in the NFS client code (bnc#1176381).\n- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).\n- CVE-2020-14381: Fixed a UAF in the fast user mutex (futex) wait operation (bsc#1176011).\n- CVE-2020-25643: Fixed an improper input validation in the ppp_cp_parse_cr function of the HDLC_PPP module (bnc#1177206).\n- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).\n- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).\n- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).\n- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).\n- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).\n- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).\n- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).\n- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).\n- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)\n- CVE-2020-27675: Fixed a race condition in event handler which may crash dom0 (XSA-331 bsc#1177410).\n\nThe following non-security bugs were fixed:\n\n- btrfs: remove root usage from can_overcommit (bsc#1131277).\n- hv: vmbus: Add timeout to vmbus_wait_for_unload (bsc#1177816).\n- hyperv_fb: disable superfluous VERSION_WIN10_V5 case (bsc#1175306).\n- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).\n- livepatch: Add -fdump-ipa-clones to build (). Add support for -fdump-ipa-clones GCC option. Update config files accordingly.\n- livepatch: Test if -fdump-ipa-clones is really available As of now we add -fdump-ipa-clones unconditionally. It does not cause a trouble if the kernel is build with the supported toolchain. Otherwise it could fail easily. Do the correct thing and test for the availability.\n- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).\n- NFS: only invalidate dentrys that are clearly invalid (bsc#1178669 bsc#1170139).\n- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).\n- NFSv4: do not mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).\n- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).\n- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).\n- powerpc/pseries/cpuidle: add polling idle for shared processor guests (bsc#1178765 ltc#188968).\n- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).\n- scsi: fnic: Do not call \u0027scsi_done()\u0027 for unhandled commands (bsc#1168468, bsc#1171675).\n- scsi: qla2xxx: Do not consume srb greedily (bsc#1173233).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1173233).\n- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).\n- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).\n- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).\n- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).\n- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/events: add a new \u0027late EOI\u0027 evtchn framework (XSA-332 bsc#1177411).\n- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).\n- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).\n- xen/events: block rogue events for some time (XSA-332 bsc#1177411).\n- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).\n- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).\n- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).\n- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).\n- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).\n- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3544,SUSE-OpenStack-Cloud-9-2020-3544,SUSE-OpenStack-Cloud-Crowbar-9-2020-3544,SUSE-SLE-HA-12-SP4-2020-3544,SUSE-SLE-Live-Patching-12-SP4-2020-3544,SUSE-SLE-SAP-12-SP4-2020-3544,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3544", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3544-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3544-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203544-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3544-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1131277", "url": "https://bugzilla.suse.com/1131277" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1163524", "url": "https://bugzilla.suse.com/1163524" }, { "category": "self", "summary": "SUSE Bug 1166965", "url": "https://bugzilla.suse.com/1166965" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1170139", "url": "https://bugzilla.suse.com/1170139" }, { "category": "self", "summary": "SUSE Bug 1170232", "url": "https://bugzilla.suse.com/1170232" }, { "category": "self", "summary": "SUSE Bug 1170415", "url": "https://bugzilla.suse.com/1170415" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1173115", "url": "https://bugzilla.suse.com/1173115" }, { "category": "self", "summary": "SUSE Bug 1173233", "url": "https://bugzilla.suse.com/1173233" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175306", "url": "https://bugzilla.suse.com/1175306" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1175882", "url": "https://bugzilla.suse.com/1175882" }, { "category": "self", "summary": "SUSE Bug 1176011", "url": "https://bugzilla.suse.com/1176011" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176278", "url": "https://bugzilla.suse.com/1176278" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176482", "url": "https://bugzilla.suse.com/1176482" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176698", "url": "https://bugzilla.suse.com/1176698" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176723", "url": "https://bugzilla.suse.com/1176723" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176732", "url": "https://bugzilla.suse.com/1176732" }, { "category": "self", "summary": "SUSE Bug 1176869", "url": "https://bugzilla.suse.com/1176869" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176922", "url": "https://bugzilla.suse.com/1176922" }, { "category": "self", "summary": "SUSE Bug 1176935", "url": "https://bugzilla.suse.com/1176935" }, { "category": "self", "summary": "SUSE Bug 1176950", "url": "https://bugzilla.suse.com/1176950" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177027", "url": "https://bugzilla.suse.com/1177027" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177340", "url": "https://bugzilla.suse.com/1177340" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177816", "url": "https://bugzilla.suse.com/1177816" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178393", "url": "https://bugzilla.suse.com/1178393" }, { "category": "self", "summary": "SUSE Bug 1178669", "url": "https://bugzilla.suse.com/1178669" }, { "category": "self", "summary": "SUSE Bug 1178765", "url": "https://bugzilla.suse.com/1178765" }, { "category": "self", "summary": "SUSE Bug 1178782", "url": "https://bugzilla.suse.com/1178782" }, { "category": "self", "summary": "SUSE Bug 1178838", "url": "https://bugzilla.suse.com/1178838" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0430 page", "url": "https://www.suse.com/security/cve/CVE-2020-0430/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14381 page", "url": "https://www.suse.com/security/cve/CVE-2020-14381/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25704 page", "url": "https://www.suse.com/security/cve/CVE-2020-25704/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27673 page", "url": "https://www.suse.com/security/cve/CVE-2020-27673/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27675 page", "url": "https://www.suse.com/security/cve/CVE-2020-27675/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-11-26T15:53:57Z", "generator": { "date": "2020-11-26T15:53:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3544-1", "initial_release_date": "2020-11-26T15:53:57Z", "revision_history": [ { "date": "2020-11-26T15:53:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.65.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.65.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.65.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-95.65.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.65.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-95.65.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-default-4.12.14-95.65.1.aarch64", "product_id": "kernel-default-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-95.65.1.aarch64", "product_id": "kernel-default-base-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-95.65.1.aarch64", "product_id": "kernel-default-devel-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-95.65.1.aarch64", "product_id": "kernel-default-extra-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-95.65.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-95.65.1.aarch64", "product_id": "kernel-obs-build-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-95.65.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-syms-4.12.14-95.65.1.aarch64", "product_id": "kernel-syms-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-95.65.1.aarch64", "product_id": "kernel-vanilla-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-95.65.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.65.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.65.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-95.65.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.65.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.65.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-95.65.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-95.65.1.noarch", "product": { "name": "kernel-devel-4.12.14-95.65.1.noarch", "product_id": "kernel-devel-4.12.14-95.65.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-95.65.1.noarch", "product": { "name": "kernel-docs-4.12.14-95.65.1.noarch", "product_id": "kernel-docs-4.12.14-95.65.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-95.65.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-95.65.1.noarch", "product_id": "kernel-docs-html-4.12.14-95.65.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-95.65.1.noarch", "product": { "name": "kernel-macros-4.12.14-95.65.1.noarch", "product_id": "kernel-macros-4.12.14-95.65.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-95.65.1.noarch", "product": { "name": "kernel-source-4.12.14-95.65.1.noarch", "product_id": "kernel-source-4.12.14-95.65.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-95.65.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-95.65.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-95.65.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.65.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-95.65.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-95.65.1.ppc64le", "product_id": "kernel-debug-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-95.65.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-95.65.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.65.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-default-4.12.14-95.65.1.ppc64le", "product_id": "kernel-default-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-95.65.1.ppc64le", "product_id": "kernel-default-base-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-95.65.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-95.65.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-95.65.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-95.65.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-95.65.1.ppc64le", "product_id": "kernel-syms-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-95.65.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-95.65.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-95.65.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.65.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-95.65.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-95.65.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.65.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-95.65.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.65.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-95.65.1.s390x", "product_id": "dlm-kmp-default-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.65.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-95.65.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.65.1.s390x", "product": { "name": "kernel-default-4.12.14-95.65.1.s390x", "product_id": "kernel-default-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.65.1.s390x", "product": { "name": "kernel-default-base-4.12.14-95.65.1.s390x", "product_id": "kernel-default-base-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.65.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-95.65.1.s390x", "product_id": "kernel-default-devel-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.65.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-95.65.1.s390x", "product_id": "kernel-default-extra-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.65.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-95.65.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-95.65.1.s390x", "product": { "name": "kernel-default-man-4.12.14-95.65.1.s390x", "product_id": "kernel-default-man-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.65.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-95.65.1.s390x", "product_id": "kernel-obs-build-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.65.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-95.65.1.s390x", "product_id": "kernel-obs-qa-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.65.1.s390x", "product": { "name": "kernel-syms-4.12.14-95.65.1.s390x", "product_id": "kernel-syms-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.65.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-95.65.1.s390x", "product_id": "kernel-vanilla-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.65.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-95.65.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.65.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-95.65.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-95.65.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-95.65.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-95.65.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-95.65.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "product_id": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.65.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-95.65.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.65.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-95.65.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-95.65.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.65.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-95.65.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.65.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-95.65.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-debug-4.12.14-95.65.1.x86_64", "product_id": "kernel-debug-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-95.65.1.x86_64", "product_id": "kernel-debug-base-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-95.65.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.65.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-default-4.12.14-95.65.1.x86_64", "product_id": "kernel-default-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-95.65.1.x86_64", "product_id": "kernel-default-base-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-95.65.1.x86_64", "product_id": "kernel-default-devel-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-95.65.1.x86_64", "product_id": "kernel-default-extra-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-95.65.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-95.65.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-95.65.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-95.65.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.65.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-95.65.1.x86_64", "product_id": "kernel-obs-build-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-95.65.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-syms-4.12.14-95.65.1.x86_64", "product_id": "kernel-syms-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-95.65.1.x86_64", "product_id": "kernel-vanilla-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-95.65.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.65.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.65.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-95.65.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-95.65.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.65.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.65.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.65.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.65.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.65.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.65.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.65.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.65.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.65.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.65.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.65.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.65.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.65.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.65.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.65.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.65.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.65.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.65.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.65.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.65.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.65.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.65.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.65.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.65.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.65.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.65.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.65.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.65.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0430" } ], "notes": [ { "category": "general", "text": "In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0430", "url": "https://www.suse.com/security/cve/CVE-2020-0430" }, { "category": "external", "summary": "SUSE Bug 1176723 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1176723" }, { "category": "external", "summary": "SUSE Bug 1178003 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1178003" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-0430" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-14381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14381" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14381", "url": "https://www.suse.com/security/cve/CVE-2020-14381" }, { "category": "external", "summary": "SUSE Bug 1176011 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176011" }, { "category": "external", "summary": "SUSE Bug 1176012 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-14381" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25704" } ], "notes": [ { "category": "general", "text": "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25704", "url": "https://www.suse.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "SUSE Bug 1178393 for CVE-2020-25704", "url": "https://bugzilla.suse.com/1178393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-25704" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-26088" }, { "cve": "CVE-2020-27673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27673" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27673", "url": "https://www.suse.com/security/cve/CVE-2020-27673" }, { "category": "external", "summary": "SUSE Bug 1177411 for CVE-2020-27673", "url": "https://bugzilla.suse.com/1177411" }, { "category": "external", "summary": "SUSE Bug 1184583 for CVE-2020-27673", "url": "https://bugzilla.suse.com/1184583" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-27673" }, { "cve": "CVE-2020-27675", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27675" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27675", "url": "https://www.suse.com/security/cve/CVE-2020-27675" }, { "category": "external", "summary": "SUSE Bug 1177410 for CVE-2020-27675", "url": "https://bugzilla.suse.com/1177410" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-27675" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-8694" } ] }
suse-su-2020:3522-1
Vulnerability from csaf_suse
Published
2020-11-25 13:32
Modified
2020-11-25 13:32
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 realtime kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-8694: Insufficient access control for some Intel(R) Processors may have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1170415).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file (bsc#1177470).
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth (bsc#1177726).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon (bsc#1178589)
The following non-security bugs were fixed:
- 9P: Cast to loff_t before multiplying (git-fixes).
- ACPI: Always build evged in (git-fixes).
- ACPI: button: fix handling lid state changes when input device closed (git-fixes).
- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).
- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).
- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).
- ACPI: dock: fix enum-conversion warning (git-fixes).
- ACPI / extlog: Check for RDMSR failure (git-fixes).
- ACPI: GED: fix -Wformat (git-fixes).
- ACPI: NFIT: Fix comparison to '-ENXIO' (git-fixes).
- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).
- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).
- ALSA: ac97: (cosmetic) align argument names (git-fixes).
- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: asihpi: fix spellint typo in comments (git-fixes).
- ALSA: atmel: ac97: clarify operator precedence (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card->ctl_files_rwlock (git-fixes).
- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: fix kernel-doc markups (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda: (cosmetic) align function parameters (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).
- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - Enable headphone for ASUS TM420 (git-fixes).
- ALSA: hda/realtek - Fixed HP headset Mic can't be detected (git-fixes).
- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hdspm: Fix typo arbitary (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: portman2x4: fix repeated word 'if' (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: sparc: dbri: fix repeated word 'the' (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -> 'Frequency' (git-fixes).
- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).
- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).
- ALSA: vx: vx_core: clarify operator precedence (git-fixes).
- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ASoC: codecs: wcd9335: Set digital gain range correctly (git-fixes).
- ASoC: cs42l51: manage mclk shutdown delay (git-fixes).
- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).
- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).
- ASoC: Intel: kbl_rt5663_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ASoC: qcom: sdm845: set driver name correctly (git-fixes).
- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).
- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ata: sata_rcar: Fix DMA boundary mask (git-fixes).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blk-mq: order adding requests to hctx->dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi->io_pages is always initialized (bsc#1177749).
- block: Fix page_is_mergeable() for compound pages (bsc#1177814).
- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).
- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).
- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).
- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: Account for merged patches upstream Move below patches to sorted section.
- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).
- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: cleanup cow block on error (bsc#1178584).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: drop path before adding new uuid tree entry (bsc#1178176).
- btrfs: fix filesystem corruption after a device replace (bsc#1178395).
- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).
- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).
- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).
- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: reschedule if necessary when logging directory items (bsc#1178585).
- btrfs: send, orphanize first all conflicting inodes when processing references (bsc#1178579).
- btrfs: send, recompute reference path after orphanization of a directory (bsc#1178581).
- btrfs: set the correct lockdep class for new nodes (bsc#1178184).
- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).
- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- can: flexcan: flexcan_remove(): disable wakeup completely (git-fixes).
- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).
- can: flexcan: remove FLEXCAN_QUIRK_DISABLE_MECR quirk for LS1021A (git-fixes).
- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).
- can: peak_usb: add range checking in decode operations (git-fixes).
- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).
- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- ceph: promote to unsigned long long before shifting (bsc#1178175).
- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).
- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).
- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).
- cosa: Add missing kfree in error path of cosa_write (git-fixes).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ccp - fix error handling (git-fixes).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).
- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- dax: Fix compilation for CONFIG_DAX && !CONFIG_FS_DAX (bsc#1177817).
- dax: fix detection of dax support for non-persistent memory block devices (bsc#1171073).
- dax: Fix stack overflow when mounting fsdax pmem device (bsc#1171073).
- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let's disable it at building out-of-tree codes
- Disable module compression on SLE15 SP2 (bsc#1178307)
- dma-buf: Remove custom seqcount lockdep class key (bsc#1176564 bsc#1162702).
- dma-buf: Use sequence counter with associated wound/wait mutex (bsc#1176564 bsc#1162702).
- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).
- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).
- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).
- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).
- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).
- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).
- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).
- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).
- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).
- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).
- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).
- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).
- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).
- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).
- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).
- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).
- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).
- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).
- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).
- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).
- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).
- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).
- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).
- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).
- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).
- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).
- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).
- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).
- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).
- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).
- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).
- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).
- dm: Call proper helper to determine dax support (bsc#1177817).
- dm/dax: Fix table reference counts (bsc#1178246).
- docs: driver-api: remove a duplicated index entry (git-fixes).
- Documentation: locking: Describe seqlock design and usage (bsc#1176564 bsc#1162702).
- Do not create null.i000.ipa-clones file (bsc#1178330)
- drbd: code cleanup by using sendpage_ok() to check page for kernel_sendpage() (bsc#1172873).
- drivers: watchdog: rdc321x_wdt: Fix race condition bugs (git-fixes).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- exfat: fix name_hash computation on big endian systems (git-fixes).
- exfat: fix overflow issue in exfat_cluster_to_sector() (git-fixes).
- exfat: fix possible memory leak in exfat_find() (git-fixes).
- exfat: fix use of uninitialized spinlock on error path (git-fixes).
- exfat: fix wrong hint_stat initialization in exfat_find_dir_entry() (git-fixes).
- exfat: fix wrong size update of stream entry by typo (git-fixes).
- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).
- fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h (git-fixes).
- ftrace: Fix recursion check for NMI test (git-fixes).
- ftrace: Handle tracing when switching between context (git-fixes).
- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).
- futex: Consistently use fshared as boolean (bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).
- futex: Remove put_futex_key() (bsc#1149032).
- futex: Remove unused or redundant includes (bsc#1149032).
- gpio: pcie-idio-24: Enable PEX8311 interrupts (git-fixes).
- gpio: pcie-idio-24: Fix IRQ Enable Register value (git-fixes).
- gpio: pcie-idio-24: Fix irq mask when masking (git-fixes).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: hid-input: fix stylus battery reporting (git-fixes).
- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- hrtimer: Use sequence counter with associated raw spinlock (bsc#1176564 bsc#1162702).
- hv_netvsc: Add XDP support (bsc#1177820).
- hv_netvsc: Fix XDP refcnt for synthetic and VF NICs (bsc#1177820).
- hv_netvsc: make recording RSS hash depend on feature flag (bsc#1177820).
- hv_netvsc: record hardware hash in skb (bsc#1177820).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).
- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).
- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- ibmvnic: save changed mac address to adapter->mac_addr (bsc#1134760 ltc#177449 git-fixes).
- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- ida: Free allocated bitmap in error path (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).
- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: Do not ignore errors from crypto_shash_update() (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: stmfts - fix a & vs && typo (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iocost: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).
- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).
- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).
- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).
- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).
- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).
- ipvlan: fix device features (networking-stable-20_08_24).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kabi fix for NFS: Fix flexfiles read failover (git-fixes).
- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- kexec: Do not take mutex when crashing kernel (bsc#1177698).
- kthread_worker: prevent queuing delayed work from timer_fn when it is being canceled (git-fixes).
- kvm/eventfd: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).
- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).
- lan743x: fix 'BUG: invalid wait context' when setting rx mode (git-fixes).
- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).
- leds: mt6323: move period calculation (git-fixes).
- libceph: clear con->out_msg on Policy::stateful_server faults (bsc#1178177).
- libceph: use sendpage_ok() in ceph_tcp_sendpage() (bsc#1172873).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- lib/crc32test: remove extra local_irq_disable/enable (git-fixes).
- lockdep: Add preemption enabled/disabled assertion APIs (bsc#1176564 bsc#1162702).
- lockdep: Split header file into lockdep and lockdep_types (bsc#1176564 bsc#1162702).
- mac80211: handle lack of sband->bitrates in rates (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).
- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).
- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).
- media: imx274: fix frame interval handling (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: platform: Improve queue set up flow for bug fixing (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: uvcvideo: Fix dereference of out-of-bound list iterator (git-fixes).
- media: uvcvideo: Fix uvc_ctrl_fixup_xu_info() not having any effect (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (bsc#1177703).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mmc: renesas_sdhi_core: Add missing tmio_mmc_host_free() at remove (git-fixes).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci-of-esdhc: Handle pulse width detection erratum for more SoCs (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm: do not panic when links can't be created in sysfs (bsc#1178002).
- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).
- mm: fix a race during THP splitting (bsc#1178255).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm: madvise: fix vma user-after-free (git-fixes).
- mm, memcg: fix inconsistent oom event behavior (bsc#1178659).
- mm/memcg: fix refcount error while moving and swapping (bsc#1178686).
- mm/memcontrol.c: add missed css_put() (bsc#1178661).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm: replace memmap_context by meminit_context (bsc#1178002).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692).
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- mm/swap: Do not abuse the seqcount_t latching API (bsc#1176564 bsc#1162702). Remove:
- mm/swapfile.c: fix potential memory leak in sys_swapon (git-fixes).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- module: Correctly truncate sysfs sections output (git-fixes).
- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).
- module: Refactor section attr into bin attribute (git-fixes).
- module: statically initialize init section freeing data (git-fixes).
- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).
- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).
- mtd: spinand: gigadevice: Add QE Bit (git-fixes).
- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: add WARN_ONCE in kernel_sendpage() for improper zero-copy send (bsc#1172873).
- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).
- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: dsa: b53: check for timeout (networking-stable-20_08_24).
- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).
- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).
- netfilter: conntrack: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).
- netfilter: nft_set_rbtree: Use sequence counter with associated rwlock (bsc#1176564 bsc#1162702).
- net: Fix bridge enslavement failure (networking-stable-20_09_24).
- net: Fix potential wrong skb->protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: introduce helper sendpage_ok() in include/linux/net.h (bsc#1172873). kABI workaround for including mm.h in include/linux/net.h (bsc#1172873).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).
- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).
- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).
- net: lantiq: Wake TX queue again (networking-stable-20_09_24).
- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).
- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).
- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).
- net: mscc: ocelot: fix race condition with TX timestamping (bsc#1178461).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).
- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).
- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- nfp: use correct define to return NONE fec (networking-stable-20_09_24).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- nfs: ensure correct writeback errors are returned on close() (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- nfs: nfs_file_write() should check for writeback errors (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- NFSv4: Handle NFS4ERR_OLD_STATEID in CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).
- NFSv4: Wait for stateid updates after CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4.x recover from pre-mature loss of openstateid (bsc#1176180).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- nvme-tcp: check page by sendpage_ok() before calling kernel_sendpage() (bsc#1172873).
- overflow: Include header file with SIZE_MAX declaration (git-fixes).
- p54: avoid accessing the data mapped to streaming DMA (git-fixes).
- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).
- PCI/ACPI: Whitelist hotplug ports for D3 if power managed by ACPI (git-fixes).
- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).
- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).
- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).
- pinctrl: aspeed: Fix GPI only function problem (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: intel: Set default bias in case no particular value given (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification.
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- PM: runtime: Drop runtime PM references to supplier on link removal (git-fixes).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- power: supply: bq27xxx: report 'not charging' on all types (git-fixes).
- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).
- pwm: img: Fix null pointer access in probe (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).
- r8169: fix operation under forced interrupt threading (git-fixes).
- raid5: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).
- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).
- rbtree_latch: Use seqcount_latch_t (bsc#1176564 bsc#1162702).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/vfs-add-super_operations-get_inode_dev. (bsc#1176983)
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).
- ring-buffer: Fix recursion protection transitions between interrupt context (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtc: rx8010: do not modify the global rtc ops (git-fixes).
- rtl8xxxu: prevent potential memory leak (git-fixes).
- rtw88: increse the size of rx buffer size (git-fixes).
- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).
- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).
- sched_clock: Expose struct clock_read_data (bsc#1176564 bsc#1162702).
- sched: tasks: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- scsi: libiscsi: use sendpage_ok() in iscsi_tcp_segment_map() (bsc#1172873).
- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- selftests/timers: Turn off timeout setting (git-fixes).
- seqcount: Compress SEQCNT_LOCKNAME_ZERO() (bsc#1176564 bsc#1162702).
- seqcount: More consistent seqprop names (bsc#1176564 bsc#1162702).
- seqlock: Add kernel-doc for seqcount_t and seqlock_t APIs (bsc#1176564 bsc#1162702).
- seqlock: Align multi-line macros newline escapes at 72 columns (bsc#1176564 bsc#1162702).
- seqlock: Extend seqcount API with associated locks (bsc#1176564 bsc#1162702).
- seqlock: Fold seqcount_LOCKNAME_init() definition (bsc#1176564 bsc#1162702).
- seqlock: Fold seqcount_LOCKNAME_t definition (bsc#1176564 bsc#1162702).
- seqlock: Implement raw_seqcount_begin() in terms of raw_read_seqcount() (bsc#1176564 bsc#1162702).
- seqlock: Introduce seqcount_latch_t (bsc#1176564 bsc#1162702).
- seqlock, kcsan: Add annotations for KCSAN (bsc#1176564 bsc#1162702).
- seqlock: lockdep assert non-preemptibility on seqcount_t write (bsc#1176564 bsc#1162702).
- seqlock: PREEMPT_RT: Do not starve seqlock_t writers (bsc#1176564 bsc#1162702).
- seqlock: Properly format kernel-doc code samples (bsc#1176564 bsc#1162702).
- seqlock: Reorder seqcount_t and seqlock_t API definitions (bsc#1176564 bsc#1162702).
- seqlock: Require WRITE_ONCE surrounding raw_seqcount_barrier (bsc#1176564 bsc#1162702).
- seqlock: seqcount latch APIs: Only allow seqcount_latch_t (bsc#1176564 bsc#1162702).
- seqlock: seqcount_LOCKNAME_t: Introduce PREEMPT_RT support (bsc#1176564 bsc#1162702).
- seqlock: seqcount_LOCKNAME_t: Standardize naming convention (bsc#1176564 bsc#1162702).
- seqlock: seqcount_t: Implement all read APIs as statement expressions (bsc#1176564 bsc#1162702).
- seqlock: seqcount_t latch: End read sections with read_seqcount_retry() (bsc#1176564 bsc#1162702).
- seqlock: s/__SEQ_LOCKDEP/__SEQ_LOCK/g (bsc#1176564 bsc#1162702).
- seqlock: Unbreak lockdep (bsc#1176564 bsc#1162702).
- seqlock: Use unique prefix for seqcount_t property accessors (bsc#1176564 bsc#1162702).
- serial: 8250_mtk: Fix uart_get_baud_rate warning (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- slimbus: core: check get_addr before removing laddr ida (git-fixes).
- slimbus: core: do not enter to clock pause mode in core (git-fixes).
- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).
- soc: fsl: qbman: Fix return value on success (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc->setup() fails (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: spi-s3c64xx: Check return values (git-fixes).
- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).
- staging: octeon: repair 'fixed-link' support (git-fixes).
- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).
- SUNRPC: Revert 241b1f419f0e ('SUNRPC: Remove xdr_buf_trim()') (git-fixes).
- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- Sync rt_debug config file.
- taprio: Fix allowing too small intervals (networking-stable-20_09_24).
- tcp: use sendpage_ok() to detect misused .sendpage (bsc#1172873).
- timekeeping: Use seqcount_latch_t (bsc#1176564 bsc#1162702).
- timekeeping: Use sequence counter with associated raw spinlock (bsc#1176564 bsc#1162702).
- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).
- time/sched_clock: Use raw_read_seqcount_latch() (bsc#1176564 bsc#1162702).
- time/sched_clock: Use raw_read_seqcount_latch() during suspend (bsc#1176564 bsc#1162702).
- time/sched_clock: Use seqcount_latch_t (bsc#1176564 bsc#1162702).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb->data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tracing: Check return value of __create_val_fields() before using its result (git-fixes).
- tracing: Fix out of bounds write in get_trace_buf (git-fixes).
- tracing: Save normal string variables (git-fixes).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: fsl_lpuart: add LS1028A support (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- tty: serial: fsl_lpuart: LS1021A had a FIFO size of 16 words, like LS1028A (git-fixes).
- uio: free uio id after uio file node is freed (git-fixes).
- USB: Add NO_LPM quirk for Kingston flash drive (git-fixes).
- USB: adutux: fix debugging (git-fixes).
- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- usb: cdc-acm: fix cooldown mechanism (git-fixes).
- USB: cdc-acm: handle broken union descriptors (git-fixes).
- USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- usb: core: Solve race condition in anchor cleanup functions (git-fixes).
- usb: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- usb: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- usb: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- usb: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- usb: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- usb: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).
- usb: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).
- usb: dwc3: simple: add support for Hikey 970 (git-fixes).
- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- usb: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- usb: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- usb: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).
- usblp: fix race between disconnect() and read() (git-fixes).
- usb: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).
- usb: ohci: Default to per-port over-current protection (git-fixes).
- USB: serial: cyberjack: fix write-URB completion race (git-fixes).
- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).
- USB: serial: option: add Cellient MPL200 card (git-fixes).
- USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231 (git-fixes).
- USB: serial: option: add Quectel EC200T module support (git-fixes).
- USB: serial: option: add Telit FN980 composition 0x1055 (git-fixes).
- USB: serial: option: Add Telit FT980-KS composition (git-fixes).
- USB: serial: pl2303: add device-id for HP GC device (git-fixes).
- USB: serial: qcserial: fix altsetting probing (git-fixes).
- usb: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).
- usb: typec: tcpm: reset hard_reset_count for any disconnect (git-fixes).
- usb: xhci-mtk: Fix typo (git-fixes).
- usb: xhci: omit duplicate actions when suspending a runtime suspended host (git-fixes).
- userfaultfd: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).
- vfs: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- vt: Disable KD_FONT_OP_COPY (bsc#1178589).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).
- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).
- watchdog: Use put_device on error (git-fixes).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- whitespace cleanup
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode->i_io_list with inode->i_lock (bsc#1177755).
- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).
- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).
- x86/ioapic: Unbreak check_timer() (bsc#1152489).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).
- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).
- x86/tsc: Use seqcount_latch_t (bsc#1176564 bsc#1162702).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xfrm: policy: Use sequence counters with associated lock (bsc#1176564 bsc#1162702).
- xfs: complain if anyone tries to create a too-large buffer log item (bsc#1166146).
- xfs: do not update mtime on COW faults (bsc#1167030).
- xfs: fix high key handling in the rt allocator's query_range function (git-fixes).
- xfs: fix scrub flagging rtinherit even if there is no rt device (git-fixes).
- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).
- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).
- xfs: force the log after remapping a synchronous-writes file (git-fixes).
- xfs: introduce XFS_MAX_FILEOFF (bsc#1166166).
- xfs: limit entries returned when counting fsmap records (git-fixes).
- xfs: remove unused variable 'done' (bsc#1166166).
- xfs: set xefi_discard when creating a deferred agfl free log intent item (git-fixes).
- xfs: truncate should remove all blocks, not just to the end of the page cache (bsc#1166166).
- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).
- xprtrdma: fix incorrect header size calculations (git-fixes).
Patchnames
SUSE-2020-3522,SUSE-SLE-Module-RT-15-SP2-2020-3522
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": " The SUSE Linux Enterprise 15 SP2 realtime kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n\n- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).\n- CVE-2020-8694: Insufficient access control for some Intel(R) Processors may have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1170415).\n- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).\n- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).\n- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).\n- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).\n- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file (bsc#1177470).\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 (bsc#1177725).\n- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).\n- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka \u0027BleedingTooth (bsc#1177726).\n- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon (bsc#1178589)\n\nThe following non-security bugs were fixed:\n\n- 9P: Cast to loff_t before multiplying (git-fixes).\n- ACPI: Always build evged in (git-fixes).\n- ACPI: button: fix handling lid state changes when input device closed (git-fixes).\n- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).\n- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).\n- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).\n- ACPI: dock: fix enum-conversion warning (git-fixes).\n- ACPI / extlog: Check for RDMSR failure (git-fixes).\n- ACPI: GED: fix -Wformat (git-fixes).\n- ACPI: NFIT: Fix comparison to \u0027-ENXIO\u0027 (git-fixes).\n- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).\n- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).\n- ALSA: ac97: (cosmetic) align argument names (git-fixes).\n- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).\n- ALSA: asihpi: fix spellint typo in comments (git-fixes).\n- ALSA: atmel: ac97: clarify operator precedence (git-fixes).\n- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).\n- ALSA: compress_offload: remove redundant initialization (git-fixes).\n- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).\n- ALSA: core: pcm: simplify locking for timers (git-fixes).\n- ALSA: core: timer: clarify operator precedence (git-fixes).\n- ALSA: core: timer: remove redundant assignment (git-fixes).\n- ALSA: ctl: Workaround for lockdep warning wrt card-\u003ectl_files_rwlock (git-fixes).\n- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).\n- ALSA: fix kernel-doc markups (git-fixes).\n- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).\n- ALSA: hda: (cosmetic) align function parameters (git-fixes).\n- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).\n- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).\n- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).\n- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).\n- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).\n- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).\n- ALSA: hda/realtek - Enable headphone for ASUS TM420 (git-fixes).\n- ALSA: hda/realtek - Fixed HP headset Mic can\u0027t be detected (git-fixes).\n- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).\n- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).\n- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).\n- ALSA: hdspm: Fix typo arbitary (git-fixes).\n- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).\n- ALSA: portman2x4: fix repeated word \u0027if\u0027 (git-fixes).\n- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).\n- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).\n- ALSA: sparc: dbri: fix repeated word \u0027the\u0027 (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).\n- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).\n- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).\n- ALSA: usb-audio: endpoint.c: fix repeated word \u0027there\u0027 (git-fixes).\n- ALSA: usb-audio: fix spelling mistake \u0027Frequence\u0027 -\u003e \u0027Frequency\u0027 (git-fixes).\n- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).\n- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).\n- ALSA: vx: vx_core: clarify operator precedence (git-fixes).\n- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).\n- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).\n- ASoC: codecs: wcd9335: Set digital gain range correctly (git-fixes).\n- ASoC: cs42l51: manage mclk shutdown delay (git-fixes).\n- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).\n- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).\n- ASoC: Intel: kbl_rt5663_max98927: Fix kabylake_ssp_fixup function (git-fixes).\n- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).\n- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).\n- ASoC: qcom: sdm845: set driver name correctly (git-fixes).\n- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).\n- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).\n- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).\n- ata: sata_rcar: Fix DMA boundary mask (git-fixes).\n- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).\n- ath10k: Fix the size used in a \u0027dma_free_coherent()\u0027 call in an error handling path (git-fixes).\n- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).\n- ath10k: provide survey info as accumulated data (git-fixes).\n- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).\n- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).\n- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).\n- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).\n- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).\n- ath9k_htc: Use appropriate rs_datalen type (git-fixes).\n- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).\n- blk-mq: order adding requests to hctx-\u003edispatch and checking SCHED_RESTART (bsc#1177750).\n- block: ensure bdi-\u003eio_pages is always initialized (bsc#1177749).\n- block: Fix page_is_mergeable() for compound pages (bsc#1177814).\n- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).\n- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).\n- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).\n- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).\n- Bluetooth: Only mark socket zapped after unlocking (git-fixes).\n- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).\n- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).\n- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).\n- brcmfmac: check ndev pointer (git-fixes).\n- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).\n- btrfs: Account for merged patches upstream Move below patches to sorted section.\n- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).\n- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).\n- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).\n- btrfs: cleanup cow block on error (bsc#1178584).\n- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).\n- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).\n- btrfs: drop path before adding new uuid tree entry (bsc#1178176).\n- btrfs: fix filesystem corruption after a device replace (bsc#1178395).\n- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).\n- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).\n- btrfs: fix race between page release and a fast fsync (bsc#1177687).\n- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).\n- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).\n- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).\n- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).\n- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).\n- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).\n- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).\n- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).\n- btrfs: release old extent maps during page release (bsc#1177687).\n- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).\n- btrfs: reschedule if necessary when logging directory items (bsc#1178585).\n- btrfs: send, orphanize first all conflicting inodes when processing references (bsc#1178579).\n- btrfs: send, recompute reference path after orphanization of a directory (bsc#1178581).\n- btrfs: set the correct lockdep class for new nodes (bsc#1178184).\n- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).\n- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).\n- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).\n- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).\n- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).\n- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).\n- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).\n- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).\n- can: flexcan: flexcan_remove(): disable wakeup completely (git-fixes).\n- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).\n- can: flexcan: remove FLEXCAN_QUIRK_DISABLE_MECR quirk for LS1021A (git-fixes).\n- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).\n- can: peak_usb: add range checking in decode operations (git-fixes).\n- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).\n- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).\n- can: softing: softing_card_shutdown(): add braces around empty body in an \u0027if\u0027 statement (git-fixes).\n- ceph: promote to unsigned long long before shifting (bsc#1178175).\n- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).\n- clk: at91: remove the checking of parent_name (git-fixes).\n- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).\n- clk: imx8mq: Fix usdhc parents order (git-fixes).\n- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).\n- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).\n- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).\n- cosa: Add missing kfree in error path of cosa_write (git-fixes).\n- create Storage / NVMe subsection\n- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).\n- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).\n- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).\n- crypto: ccp - fix error handling (git-fixes).\n- crypto: ixp4xx - Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).\n- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).\n- crypto: picoxcell - Fix potential race condition bug (git-fixes).\n- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).\n- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).\n- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).\n- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).\n- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).\n- dax: Fix compilation for CONFIG_DAX \u0026\u0026 !CONFIG_FS_DAX (bsc#1177817).\n- dax: fix detection of dax support for non-persistent memory block devices (bsc#1171073).\n- dax: Fix stack overflow when mounting fsdax pmem device (bsc#1171073).\n- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let\u0027s disable it at building out-of-tree codes\n- Disable module compression on SLE15 SP2 (bsc#1178307)\n- dma-buf: Remove custom seqcount lockdep class key (bsc#1176564 bsc#1162702).\n- dma-buf: Use sequence counter with associated wound/wait mutex (bsc#1176564 bsc#1162702).\n- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).\n- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).\n- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).\n- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).\n- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).\n- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).\n- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).\n- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).\n- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).\n- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).\n- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).\n- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).\n- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).\n- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).\n- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).\n- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).\n- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).\n- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).\n- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).\n- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).\n- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).\n- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).\n- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).\n- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).\n- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).\n- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).\n- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).\n- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).\n- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).\n- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).\n- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).\n- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).\n- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).\n- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).\n- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).\n- dm: Call proper helper to determine dax support (bsc#1177817).\n- dm/dax: Fix table reference counts (bsc#1178246).\n- docs: driver-api: remove a duplicated index entry (git-fixes).\n- Documentation: locking: Describe seqlock design and usage (bsc#1176564 bsc#1162702).\n- Do not create null.i000.ipa-clones file (bsc#1178330)\n- drbd: code cleanup by using sendpage_ok() to check page for kernel_sendpage() (bsc#1172873).\n- drivers: watchdog: rdc321x_wdt: Fix race condition bugs (git-fixes).\n- drop Storage / bsc#1171688 subsection No effect on expanded tree.\n- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).\n- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).\n- exfat: fix name_hash computation on big endian systems (git-fixes).\n- exfat: fix overflow issue in exfat_cluster_to_sector() (git-fixes).\n- exfat: fix possible memory leak in exfat_find() (git-fixes).\n- exfat: fix use of uninitialized spinlock on error path (git-fixes).\n- exfat: fix wrong hint_stat initialization in exfat_find_dir_entry() (git-fixes).\n- exfat: fix wrong size update of stream entry by typo (git-fixes).\n- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).\n- fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h (git-fixes).\n- ftrace: Fix recursion check for NMI test (git-fixes).\n- ftrace: Handle tracing when switching between context (git-fixes).\n- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).\n- futex: Consistently use fshared as boolean (bsc#1149032).\n- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).\n- futex: Remove put_futex_key() (bsc#1149032).\n- futex: Remove unused or redundant includes (bsc#1149032).\n- gpio: pcie-idio-24: Enable PEX8311 interrupts (git-fixes).\n- gpio: pcie-idio-24: Fix IRQ Enable Register value (git-fixes).\n- gpio: pcie-idio-24: Fix irq mask when masking (git-fixes).\n- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).\n- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).\n- HID: hid-input: fix stylus battery reporting (git-fixes).\n- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).\n- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).\n- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).\n- hrtimer: Use sequence counter with associated raw spinlock (bsc#1176564 bsc#1162702).\n- hv_netvsc: Add XDP support (bsc#1177820).\n- hv_netvsc: Fix XDP refcnt for synthetic and VF NICs (bsc#1177820).\n- hv_netvsc: make recording RSS hash depend on feature flag (bsc#1177820).\n- hv_netvsc: record hardware hash in skb (bsc#1177820).\n- hwmon: (mlxreg-fan) Fix double \u0027Mellanox\u0027 (git-fixes).\n- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).\n- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).\n- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).\n- i2c: cpm: Fix i2c_ram structure (git-fixes).\n- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).\n- i2c: meson: fix clock setting overwrite (git-fixes).\n- i2c: meson: fixup rate calculation with filter delay (git-fixes).\n- i2c: owl: Clear NACK and BUS error bits (git-fixes).\n- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).\n- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).\n- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).\n- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).\n- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).\n- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).\n- ibmvnic: save changed mac address to adapter-\u003emac_addr (bsc#1134760 ltc#177449 git-fixes).\n- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).\n- icmp: randomize the global rate limiter (git-fixes).\n- ida: Free allocated bitmap in error path (git-fixes).\n- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).\n- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).\n- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).\n- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).\n- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).\n- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).\n- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).\n- ima: Do not ignore errors from crypto_shash_update() (git-fixes).\n- ima: extend boot_aggregate with kernel measurements (bsc#1177617).\n- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).\n- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).\n- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).\n- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: stmfts - fix a \u0026 vs \u0026\u0026 typo (git-fixes).\n- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).\n- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).\n- iocost: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).\n- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).\n- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).\n- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).\n- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).\n- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).\n- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).\n- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).\n- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).\n- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).\n- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).\n- ipvlan: fix device features (networking-stable-20_08_24).\n- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).\n- kabi fix for NFS: Fix flexfiles read failover (git-fixes).\n- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).\n- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.\n- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).\n- kbuild: enforce -Werror=return-type (bsc#1177281).\n- kexec: Do not take mutex when crashing kernel (bsc#1177698).\n- kthread_worker: prevent queuing delayed work from timer_fn when it is being canceled (git-fixes).\n- kvm/eventfd: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).\n- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).\n- lan743x: fix \u0027BUG: invalid wait context\u0027 when setting rx mode (git-fixes).\n- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).\n- leds: mt6323: move period calculation (git-fixes).\n- libceph: clear con-\u003eout_msg on Policy::stateful_server faults (bsc#1178177).\n- libceph: use sendpage_ok() in ceph_tcp_sendpage() (bsc#1172873).\n- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).\n- lib/crc32test: remove extra local_irq_disable/enable (git-fixes).\n- lockdep: Add preemption enabled/disabled assertion APIs (bsc#1176564 bsc#1162702).\n- lockdep: Split header file into lockdep and lockdep_types (bsc#1176564 bsc#1162702).\n- mac80211: handle lack of sband-\u003ebitrates in rates (git-fixes).\n- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).\n- mailbox: avoid timer start from callback (git-fixes).\n- media: ati_remote: sanity check for both endpoints (git-fixes).\n- media: bdisp: Fix runtime PM imbalance on error (git-fixes).\n- media: camss: Fix a reference count leak (git-fixes).\n- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).\n- media: exynos4-is: Fix a reference count leak (git-fixes).\n- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).\n- media: firewire: fix memory leak (git-fixes).\n- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).\n- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).\n- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).\n- media: imx274: fix frame interval handling (git-fixes).\n- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).\n- media: media/pci: prevent memory leak in bttv_probe (git-fixes).\n- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).\n- media: omap3isp: Fix memleak in isp_probe (git-fixes).\n- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).\n- media: platform: fcp: Fix a reference count leak (git-fixes).\n- media: platform: Improve queue set up flow for bug fixing (git-fixes).\n- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).\n- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).\n- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).\n- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).\n- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).\n- media: rcar-vin: Fix a reference count leak (git-fixes).\n- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).\n- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).\n- media: Revert \u0027media: exynos4-is: Add missed check for pinctrl_lookup_state()\u0027 (git-fixes).\n- media: rockchip/rga: Fix a reference count leak (git-fixes).\n- media: s5p-mfc: Fix a reference count leak (git-fixes).\n- media: saa7134: avoid a shift overflow (git-fixes).\n- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).\n- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).\n- media: sti: Fix reference count leaks (git-fixes).\n- media: stm32-dcmi: Fix a reference count leak (git-fixes).\n- media: tc358743: cleanup tc358743_cec_isr (git-fixes).\n- media: tc358743: initialize variable (git-fixes).\n- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).\n- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).\n- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).\n- media: usbtv: Fix refcounting mixup (git-fixes).\n- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).\n- media: uvcvideo: Fix dereference of out-of-bound list iterator (git-fixes).\n- media: uvcvideo: Fix uvc_ctrl_fixup_xu_info() not having any effect (git-fixes).\n- media: uvcvideo: Set media controller entity functions (git-fixes).\n- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).\n- media: v4l2-async: Document asd allocation requirements (git-fixes).\n- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).\n- media: vsp1: Fix runtime PM imbalance on error (git-fixes).\n- memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (bsc#1177703).\n- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).\n- memory: omap-gpmc: Fix a couple off by ones (git-fixes).\n- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).\n- mfd: sm501: Fix leaks in probe() (git-fixes).\n- mic: vop: copy data to kernel space then write to io memory (git-fixes).\n- misc: mic: scif: Fix error handling path (git-fixes).\n- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).\n- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).\n- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).\n- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).\n- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).\n- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).\n- mmc: renesas_sdhi_core: Add missing tmio_mmc_host_free() at remove (git-fixes).\n- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).\n- mmc: sdhci-of-esdhc: Handle pulse width detection erratum for more SoCs (git-fixes).\n- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).\n- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).\n- mm: do not panic when links can\u0027t be created in sysfs (bsc#1178002).\n- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).\n- mm: fix a race during THP splitting (bsc#1178255).\n- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).\n- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).\n- mm: madvise: fix vma user-after-free (git-fixes).\n- mm, memcg: fix inconsistent oom event behavior (bsc#1178659).\n- mm/memcg: fix refcount error while moving and swapping (bsc#1178686).\n- mm/memcontrol.c: add missed css_put() (bsc#1178661).\n- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).\n- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).\n- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).\n- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).\n- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).\n- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).\n- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).\n- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).\n- mm: replace memmap_context by meminit_context (bsc#1178002).\n- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).\n- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692).\n- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).\n- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).\n- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).\n- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).\n- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).\n- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).\n- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).\n- mm/swap: Do not abuse the seqcount_t latching API (bsc#1176564 bsc#1162702). Remove:\n- mm/swapfile.c: fix potential memory leak in sys_swapon (git-fixes).\n- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).\n- module: Correctly truncate sysfs sections output (git-fixes).\n- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).\n- module: Refactor section attr into bin attribute (git-fixes).\n- module: statically initialize init section freeing data (git-fixes).\n- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).\n- mtd: lpddr: fix excessive stack usage with clang (git-fixes).\n- mtd: mtdoops: Do not write panic data twice (git-fixes).\n- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).\n- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).\n- mtd: spinand: gigadevice: Add QE Bit (git-fixes).\n- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).\n- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).\n- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).\n- mwifiex: fix double free (git-fixes).\n- mwifiex: remove function pointer check (git-fixes).\n- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).\n- net: add WARN_ONCE in kernel_sendpage() for improper zero-copy send (bsc#1172873).\n- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).\n- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).\n- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).\n- net: disable netpoll on fresh napis (networking-stable-20_09_11).\n- net: dsa: b53: check for timeout (networking-stable-20_08_24).\n- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).\n- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).\n- netfilter: conntrack: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).\n- netfilter: nft_set_rbtree: Use sequence counter with associated rwlock (bsc#1176564 bsc#1162702).\n- net: Fix bridge enslavement failure (networking-stable-20_09_24).\n- net: Fix potential wrong skb-\u003eprotocol in skb_vlan_untag() (networking-stable-20_08_24).\n- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).\n- net: introduce helper sendpage_ok() in include/linux/net.h (bsc#1172873). kABI workaround for including mm.h in include/linux/net.h (bsc#1172873).\n- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).\n- netlabel: fix problems with mapping removal (networking-stable-20_09_11).\n- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).\n- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).\n- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).\n- net: lantiq: Wake TX queue again (networking-stable-20_09_24).\n- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).\n- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).\n- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).\n- net: mscc: ocelot: fix race condition with TX timestamping (bsc#1178461).\n- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).\n- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).\n- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).\n- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).\n- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).\n- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).\n- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).\n- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).\n- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).\n- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).\n- net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition (git-fixes).\n- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).\n- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).\n- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).\n- nfp: use correct define to return NONE fec (networking-stable-20_09_24).\n- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).\n- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).\n- NFS: Do not return layout segments that are in use (git-fixes).\n- nfs: ensure correct writeback errors are returned on close() (git-fixes).\n- NFS: Fix flexfiles read failover (git-fixes).\n- nfs: nfs_file_write() should check for writeback errors (git-fixes).\n- NFSv4.2: fix client\u0027s attribute cache management for copy_file_range (git-fixes).\n- NFSv4: Handle NFS4ERR_OLD_STATEID in CLOSE/OPEN_DOWNGRADE (bsc#1176180).\n- NFSv4: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).\n- NFSv4: Wait for stateid updates after CLOSE/OPEN_DOWNGRADE (bsc#1176180).\n- NFSv4.x recover from pre-mature loss of openstateid (bsc#1176180).\n- nl80211: fix non-split wiphy information (git-fixes).\n- NTB: hw: amd: fix an issue about leak system resources (git-fixes).\n- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).\n- nvme-multipath: retry commands for dying queues (bsc#1171688).\n- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).\n- nvme-rdma: fix crash when connect rejected (bsc#1174748).\n- nvme-tcp: check page by sendpage_ok() before calling kernel_sendpage() (bsc#1172873).\n- overflow: Include header file with SIZE_MAX declaration (git-fixes).\n- p54: avoid accessing the data mapped to streaming DMA (git-fixes).\n- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).\n- PCI/ACPI: Whitelist hotplug ports for D3 if power managed by ACPI (git-fixes).\n- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).\n- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).\n- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).\n- pinctrl: aspeed: Fix GPI only function problem (git-fixes).\n- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).\n- pinctrl: intel: Set default bias in case no particular value given (git-fixes).\n- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).\n- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).\n- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification.\n- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).\n- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).\n- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).\n- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).\n- PM: runtime: Drop runtime PM references to supplier on link removal (git-fixes).\n- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).\n- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).\n- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).\n- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).\n- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).\n- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).\n- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).\n- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).\n- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).\n- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).\n- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).\n- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).\n- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).\n- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).\n- power: supply: bq27xxx: report \u0027not charging\u0027 on all types (git-fixes).\n- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).\n- pwm: img: Fix null pointer access in probe (git-fixes).\n- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).\n- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).\n- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).\n- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).\n- r8169: fix data corruption issue on RTL8402 (bsc#1174098).\n- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).\n- r8169: fix operation under forced interrupt threading (git-fixes).\n- raid5: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).\n- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).\n- rbtree_latch: Use seqcount_latch_t (bsc#1176564 bsc#1162702).\n- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).\n- Refresh patches.suse/vfs-add-super_operations-get_inode_dev. (bsc#1176983)\n- regulator: axp20x: fix LDO2/4 description (git-fixes).\n- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).\n- regulator: resolve supply after creating regulator (git-fixes).\n- rename Other drivers / Intel IOMMU subsection to IOMMU\n- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).\n- ring-buffer: Fix recursion protection transitions between interrupt context (git-fixes).\n- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).\n- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)\n- rtc: rx8010: do not modify the global rtc ops (git-fixes).\n- rtl8xxxu: prevent potential memory leak (git-fixes).\n- rtw88: increse the size of rx buffer size (git-fixes).\n- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).\n- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).\n- sched_clock: Expose struct clock_read_data (bsc#1176564 bsc#1162702).\n- sched: tasks: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).\n- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).\n- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).\n- scsi: libiscsi: use sendpage_ok() in iscsi_tcp_segment_map() (bsc#1172873).\n- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove unneeded variable \u0027rval\u0027 (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).\n- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).\n- selftests/timers: Turn off timeout setting (git-fixes).\n- seqcount: Compress SEQCNT_LOCKNAME_ZERO() (bsc#1176564 bsc#1162702).\n- seqcount: More consistent seqprop names (bsc#1176564 bsc#1162702).\n- seqlock: Add kernel-doc for seqcount_t and seqlock_t APIs (bsc#1176564 bsc#1162702).\n- seqlock: Align multi-line macros newline escapes at 72 columns (bsc#1176564 bsc#1162702).\n- seqlock: Extend seqcount API with associated locks (bsc#1176564 bsc#1162702).\n- seqlock: Fold seqcount_LOCKNAME_init() definition (bsc#1176564 bsc#1162702).\n- seqlock: Fold seqcount_LOCKNAME_t definition (bsc#1176564 bsc#1162702).\n- seqlock: Implement raw_seqcount_begin() in terms of raw_read_seqcount() (bsc#1176564 bsc#1162702).\n- seqlock: Introduce seqcount_latch_t (bsc#1176564 bsc#1162702).\n- seqlock, kcsan: Add annotations for KCSAN (bsc#1176564 bsc#1162702).\n- seqlock: lockdep assert non-preemptibility on seqcount_t write (bsc#1176564 bsc#1162702).\n- seqlock: PREEMPT_RT: Do not starve seqlock_t writers (bsc#1176564 bsc#1162702).\n- seqlock: Properly format kernel-doc code samples (bsc#1176564 bsc#1162702).\n- seqlock: Reorder seqcount_t and seqlock_t API definitions (bsc#1176564 bsc#1162702).\n- seqlock: Require WRITE_ONCE surrounding raw_seqcount_barrier (bsc#1176564 bsc#1162702).\n- seqlock: seqcount latch APIs: Only allow seqcount_latch_t (bsc#1176564 bsc#1162702).\n- seqlock: seqcount_LOCKNAME_t: Introduce PREEMPT_RT support (bsc#1176564 bsc#1162702).\n- seqlock: seqcount_LOCKNAME_t: Standardize naming convention (bsc#1176564 bsc#1162702).\n- seqlock: seqcount_t: Implement all read APIs as statement expressions (bsc#1176564 bsc#1162702).\n- seqlock: seqcount_t latch: End read sections with read_seqcount_retry() (bsc#1176564 bsc#1162702).\n- seqlock: s/__SEQ_LOCKDEP/__SEQ_LOCK/g (bsc#1176564 bsc#1162702).\n- seqlock: Unbreak lockdep (bsc#1176564 bsc#1162702).\n- seqlock: Use unique prefix for seqcount_t property accessors (bsc#1176564 bsc#1162702).\n- serial: 8250_mtk: Fix uart_get_baud_rate warning (git-fixes).\n- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).\n- slimbus: core: check get_addr before removing laddr ida (git-fixes).\n- slimbus: core: do not enter to clock pause mode in core (git-fixes).\n- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).\n- soc: fsl: qbman: Fix return value on success (git-fixes).\n- spi: dw-pci: free previously allocated IRQs if desc-\u003esetup() fails (git-fixes).\n- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).\n- spi: spi-s3c64xx: Check return values (git-fixes).\n- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).\n- spi: sprd: Release DMA channel also on probe deferral (git-fixes).\n- spi: stm32: Rate-limit the \u0027Communication suspended\u0027 message (git-fixes).\n- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).\n- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).\n- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).\n- staging: octeon: repair \u0027fixed-link\u0027 support (git-fixes).\n- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).\n- SUNRPC: Revert 241b1f419f0e (\u0027SUNRPC: Remove xdr_buf_trim()\u0027) (git-fixes).\n- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (git-fixes).\n- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).\n- Sync rt_debug config file.\n- taprio: Fix allowing too small intervals (networking-stable-20_09_24).\n- tcp: use sendpage_ok() to detect misused .sendpage (bsc#1172873).\n- timekeeping: Use seqcount_latch_t (bsc#1176564 bsc#1162702).\n- timekeeping: Use sequence counter with associated raw spinlock (bsc#1176564 bsc#1162702).\n- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).\n- time/sched_clock: Use raw_read_seqcount_latch() (bsc#1176564 bsc#1162702).\n- time/sched_clock: Use raw_read_seqcount_latch() during suspend (bsc#1176564 bsc#1162702).\n- time/sched_clock: Use seqcount_latch_t (bsc#1176564 bsc#1162702).\n- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).\n- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).\n- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).\n- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).\n- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).\n- tipc: fix uninit skb-\u003edata in tipc_nl_compat_dumpit() (networking-stable-20_08_24).\n- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).\n- tracing: Check return value of __create_val_fields() before using its result (git-fixes).\n- tracing: Fix out of bounds write in get_trace_buf (git-fixes).\n- tracing: Save normal string variables (git-fixes).\n- tty: ipwireless: fix error handling (git-fixes).\n- tty: serial: fsl_lpuart: add LS1028A support (git-fixes).\n- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).\n- tty: serial: fsl_lpuart: LS1021A had a FIFO size of 16 words, like LS1028A (git-fixes).\n- uio: free uio id after uio file node is freed (git-fixes).\n- USB: Add NO_LPM quirk for Kingston flash drive (git-fixes).\n- USB: adutux: fix debugging (git-fixes).\n- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).\n- usb: cdc-acm: fix cooldown mechanism (git-fixes).\n- USB: cdc-acm: handle broken union descriptors (git-fixes).\n- USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).\n- usb: core: Solve race condition in anchor cleanup functions (git-fixes).\n- usb: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).\n- usb: dwc2: Fix parameter type in function pointer prototype (git-fixes).\n- usb: dwc3: core: add phy cleanup for probe error handling (git-fixes).\n- usb: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).\n- usb: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).\n- usb: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).\n- usb: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).\n- usb: dwc3: simple: add support for Hikey 970 (git-fixes).\n- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).\n- usb: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).\n- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).\n- usb: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).\n- usb: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).\n- usblp: fix race between disconnect() and read() (git-fixes).\n- usb: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).\n- usb: ohci: Default to per-port over-current protection (git-fixes).\n- USB: serial: cyberjack: fix write-URB completion race (git-fixes).\n- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).\n- USB: serial: option: add Cellient MPL200 card (git-fixes).\n- USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231 (git-fixes).\n- USB: serial: option: add Quectel EC200T module support (git-fixes).\n- USB: serial: option: add Telit FN980 composition 0x1055 (git-fixes).\n- USB: serial: option: Add Telit FT980-KS composition (git-fixes).\n- USB: serial: pl2303: add device-id for HP GC device (git-fixes).\n- USB: serial: qcserial: fix altsetting probing (git-fixes).\n- usb: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).\n- usb: typec: tcpm: reset hard_reset_count for any disconnect (git-fixes).\n- usb: xhci-mtk: Fix typo (git-fixes).\n- usb: xhci: omit duplicate actions when suspending a runtime suspended host (git-fixes).\n- userfaultfd: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).\n- vfs: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).\n- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).\n- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).\n- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).\n- virtio-net: do not disable guest csum when disable LRO (git-fixes).\n- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).\n- vt: Disable KD_FONT_OP_COPY (bsc#1178589).\n- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).\n- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).\n- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).\n- watchdog: Use put_device on error (git-fixes).\n- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).\n- whitespace cleanup\n- writeback: Avoid skipping inode writeback (bsc#1177755).\n- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).\n- writeback: Protect inode-\u003ei_io_list with inode-\u003ei_lock (bsc#1177755).\n- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).\n- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).\n- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).\n- x86/ioapic: Unbreak check_timer() (bsc#1152489).\n- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).\n- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).\n- x86/tsc: Use seqcount_latch_t (bsc#1176564 bsc#1162702).\n- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).\n- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).\n- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/events: add a new \u0027late EOI\u0027 evtchn framework (XSA-332 bsc#1177411).\n- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).\n- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).\n- xen/events: block rogue events for some time (XSA-332 bsc#1177411).\n- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).\n- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).\n- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).\n- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).\n- xen/gntdev.c: Mark pages as dirty (bsc#1065600).\n- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xfrm: policy: Use sequence counters with associated lock (bsc#1176564 bsc#1162702).\n- xfs: complain if anyone tries to create a too-large buffer log item (bsc#1166146).\n- xfs: do not update mtime on COW faults (bsc#1167030).\n- xfs: fix high key handling in the rt allocator\u0027s query_range function (git-fixes).\n- xfs: fix scrub flagging rtinherit even if there is no rt device (git-fixes).\n- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).\n- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).\n- xfs: force the log after remapping a synchronous-writes file (git-fixes).\n- xfs: introduce XFS_MAX_FILEOFF (bsc#1166166).\n- xfs: limit entries returned when counting fsmap records (git-fixes).\n- xfs: remove unused variable \u0027done\u0027 (bsc#1166166).\n- xfs: set xefi_discard when creating a deferred agfl free log intent item (git-fixes).\n- xfs: truncate should remove all blocks, not just to the end of the page cache (bsc#1166166).\n- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3522,SUSE-SLE-Module-RT-15-SP2-2020-3522", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3522-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3522-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203522-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3522-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" }, { "category": "self", "summary": "SUSE Bug 1055014", "url": "https://bugzilla.suse.com/1055014" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1061843", "url": "https://bugzilla.suse.com/1061843" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066382", "url": "https://bugzilla.suse.com/1066382" }, { "category": "self", "summary": "SUSE Bug 1077428", "url": "https://bugzilla.suse.com/1077428" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 1134760", "url": "https://bugzilla.suse.com/1134760" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1162702", "url": "https://bugzilla.suse.com/1162702" }, { "category": "self", "summary": "SUSE Bug 1163592", "url": "https://bugzilla.suse.com/1163592" }, { "category": "self", "summary": "SUSE Bug 1164648", "url": "https://bugzilla.suse.com/1164648" }, { "category": "self", "summary": "SUSE Bug 1165692", "url": "https://bugzilla.suse.com/1165692" }, { "category": "self", "summary": "SUSE Bug 1166146", "url": "https://bugzilla.suse.com/1166146" }, { "category": "self", "summary": "SUSE Bug 1166166", "url": "https://bugzilla.suse.com/1166166" }, { "category": "self", "summary": "SUSE Bug 1167030", "url": "https://bugzilla.suse.com/1167030" }, { "category": "self", "summary": "SUSE Bug 1170415", "url": "https://bugzilla.suse.com/1170415" }, { "category": "self", "summary": "SUSE Bug 1170446", "url": "https://bugzilla.suse.com/1170446" }, { "category": "self", "summary": "SUSE Bug 1171073", "url": "https://bugzilla.suse.com/1171073" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1172873", "url": "https://bugzilla.suse.com/1172873" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174098", "url": "https://bugzilla.suse.com/1174098" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1174969", "url": "https://bugzilla.suse.com/1174969" }, { "category": "self", "summary": "SUSE Bug 1175052", "url": "https://bugzilla.suse.com/1175052" }, { "category": "self", "summary": "SUSE Bug 1175306", "url": "https://bugzilla.suse.com/1175306" }, { "category": "self", "summary": "SUSE Bug 1175621", "url": "https://bugzilla.suse.com/1175621" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175807", "url": "https://bugzilla.suse.com/1175807" }, { "category": "self", "summary": "SUSE Bug 1175898", "url": "https://bugzilla.suse.com/1175898" }, { "category": "self", "summary": "SUSE Bug 1176180", "url": "https://bugzilla.suse.com/1176180" }, { "category": "self", "summary": "SUSE Bug 1176354", "url": "https://bugzilla.suse.com/1176354" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176564", "url": "https://bugzilla.suse.com/1176564" }, { "category": "self", "summary": "SUSE Bug 1176713", "url": "https://bugzilla.suse.com/1176713" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176983", "url": "https://bugzilla.suse.com/1176983" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177090", "url": "https://bugzilla.suse.com/1177090" }, { "category": "self", "summary": "SUSE Bug 1177109", "url": "https://bugzilla.suse.com/1177109" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177281", "url": "https://bugzilla.suse.com/1177281" }, { "category": "self", "summary": "SUSE Bug 1177353", "url": "https://bugzilla.suse.com/1177353" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177617", "url": "https://bugzilla.suse.com/1177617" }, { "category": "self", "summary": "SUSE Bug 1177681", "url": "https://bugzilla.suse.com/1177681" }, { "category": "self", "summary": "SUSE Bug 1177683", "url": "https://bugzilla.suse.com/1177683" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177694", "url": "https://bugzilla.suse.com/1177694" }, { "category": "self", "summary": "SUSE Bug 1177697", "url": "https://bugzilla.suse.com/1177697" }, { "category": "self", "summary": "SUSE Bug 1177698", "url": "https://bugzilla.suse.com/1177698" }, { "category": "self", "summary": "SUSE Bug 1177703", "url": "https://bugzilla.suse.com/1177703" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177726", "url": "https://bugzilla.suse.com/1177726" }, { "category": "self", "summary": "SUSE Bug 1177727", "url": "https://bugzilla.suse.com/1177727" }, { "category": "self", "summary": "SUSE Bug 1177729", "url": "https://bugzilla.suse.com/1177729" }, { "category": "self", "summary": "SUSE Bug 1177739", "url": "https://bugzilla.suse.com/1177739" }, { "category": "self", "summary": "SUSE Bug 1177749", "url": "https://bugzilla.suse.com/1177749" }, { "category": "self", "summary": "SUSE Bug 1177750", "url": "https://bugzilla.suse.com/1177750" }, { "category": "self", "summary": "SUSE Bug 1177754", "url": "https://bugzilla.suse.com/1177754" }, { "category": "self", "summary": "SUSE Bug 1177755", "url": "https://bugzilla.suse.com/1177755" }, { "category": "self", "summary": "SUSE Bug 1177765", "url": "https://bugzilla.suse.com/1177765" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177799", "url": "https://bugzilla.suse.com/1177799" }, { "category": "self", "summary": "SUSE Bug 1177801", "url": "https://bugzilla.suse.com/1177801" }, { "category": "self", "summary": "SUSE Bug 1177814", "url": "https://bugzilla.suse.com/1177814" }, { "category": "self", "summary": "SUSE Bug 1177817", "url": "https://bugzilla.suse.com/1177817" }, { "category": "self", "summary": "SUSE Bug 1177820", "url": "https://bugzilla.suse.com/1177820" }, { "category": "self", "summary": "SUSE Bug 1177854", "url": "https://bugzilla.suse.com/1177854" }, { "category": "self", "summary": "SUSE Bug 1177855", "url": "https://bugzilla.suse.com/1177855" }, { "category": "self", "summary": "SUSE Bug 1177856", "url": "https://bugzilla.suse.com/1177856" }, { "category": "self", "summary": "SUSE Bug 1177861", "url": "https://bugzilla.suse.com/1177861" }, { "category": "self", "summary": "SUSE Bug 1178002", "url": "https://bugzilla.suse.com/1178002" }, { "category": "self", "summary": "SUSE Bug 1178079", "url": "https://bugzilla.suse.com/1178079" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178166", "url": "https://bugzilla.suse.com/1178166" }, { "category": "self", "summary": "SUSE Bug 1178173", "url": "https://bugzilla.suse.com/1178173" }, { "category": "self", "summary": "SUSE Bug 1178175", "url": "https://bugzilla.suse.com/1178175" }, { "category": "self", "summary": "SUSE Bug 1178176", "url": "https://bugzilla.suse.com/1178176" }, { "category": "self", "summary": "SUSE Bug 1178177", "url": "https://bugzilla.suse.com/1178177" }, { "category": "self", "summary": "SUSE Bug 1178183", "url": "https://bugzilla.suse.com/1178183" }, { "category": "self", "summary": "SUSE Bug 1178184", "url": "https://bugzilla.suse.com/1178184" }, { "category": "self", "summary": "SUSE Bug 1178185", "url": "https://bugzilla.suse.com/1178185" }, { "category": "self", "summary": "SUSE Bug 1178186", "url": "https://bugzilla.suse.com/1178186" }, { "category": "self", "summary": "SUSE Bug 1178190", "url": "https://bugzilla.suse.com/1178190" }, { "category": "self", "summary": "SUSE Bug 1178191", "url": "https://bugzilla.suse.com/1178191" }, { "category": "self", "summary": "SUSE Bug 1178246", "url": "https://bugzilla.suse.com/1178246" }, { "category": "self", "summary": "SUSE Bug 1178255", "url": "https://bugzilla.suse.com/1178255" }, { "category": "self", "summary": "SUSE Bug 1178304", "url": "https://bugzilla.suse.com/1178304" }, { "category": "self", "summary": "SUSE Bug 1178307", "url": "https://bugzilla.suse.com/1178307" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178393", "url": "https://bugzilla.suse.com/1178393" }, { "category": "self", "summary": "SUSE Bug 1178395", "url": "https://bugzilla.suse.com/1178395" }, { "category": "self", "summary": "SUSE Bug 1178461", "url": "https://bugzilla.suse.com/1178461" }, { "category": "self", "summary": "SUSE Bug 1178579", "url": "https://bugzilla.suse.com/1178579" }, { "category": "self", "summary": "SUSE Bug 1178581", "url": "https://bugzilla.suse.com/1178581" }, { "category": "self", "summary": "SUSE Bug 1178584", "url": "https://bugzilla.suse.com/1178584" }, { "category": "self", "summary": "SUSE Bug 1178585", "url": "https://bugzilla.suse.com/1178585" }, { "category": "self", "summary": "SUSE Bug 1178589", "url": "https://bugzilla.suse.com/1178589" }, { "category": "self", "summary": "SUSE Bug 1178591", "url": "https://bugzilla.suse.com/1178591" }, { "category": "self", "summary": "SUSE Bug 1178622", "url": "https://bugzilla.suse.com/1178622" }, { "category": "self", "summary": "SUSE Bug 1178659", "url": "https://bugzilla.suse.com/1178659" }, { "category": "self", "summary": "SUSE Bug 1178661", "url": "https://bugzilla.suse.com/1178661" }, { "category": "self", "summary": "SUSE Bug 1178686", "url": "https://bugzilla.suse.com/1178686" }, { "category": "self", "summary": "SUSE Bug 1178700", "url": "https://bugzilla.suse.com/1178700" }, { "category": "self", "summary": "SUSE Bug 1178782", "url": "https://bugzilla.suse.com/1178782" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25704 page", "url": "https://www.suse.com/security/cve/CVE-2020-25704/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28974 page", "url": "https://www.suse.com/security/cve/CVE-2020-28974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-11-25T13:32:43Z", "generator": { "date": "2020-11-25T13:32:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3522-1", "initial_release_date": "2020-11-25T13:32:43Z", "revision_history": [ { "date": "2020-11-25T13:32:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-16.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-16.1.noarch", "product_id": "kernel-devel-rt-5.3.18-16.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-16.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-16.1.noarch", "product_id": "kernel-source-rt-5.3.18-16.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-16.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-16.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-16.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-16.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-16.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-16.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-16.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-16.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-16.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-16.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-16.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-16.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-16.1.x86_64", "product": { "name": "kernel-rt-5.3.18-16.1.x86_64", "product_id": "kernel-rt-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-16.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-16.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-16.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-16.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-5.3.18-16.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-5.3.18-16.1.x86_64", "product_id": "kernel-rt-livepatch-devel-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-16.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-16.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-16.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-16.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-16.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-16.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-5.3.18-16.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-5.3.18-16.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-16.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-16.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-16.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-16.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-16.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-16.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-16.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-16.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-16.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-16.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-16.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-16.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-16.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-16.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-16.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-16.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Real Time Module 15 SP2", "product": { "name": "SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-5.3.18-16.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-5.3.18-16.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-5.3.18-16.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64" }, "product_reference": "dlm-kmp-rt-5.3.18-16.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-5.3.18-16.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64" }, "product_reference": "gfs2-kmp-rt-5.3.18-16.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-5.3.18-16.1.noarch as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch" }, "product_reference": "kernel-devel-rt-5.3.18-16.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-16.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-16.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-5.3.18-16.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64" }, "product_reference": "kernel-rt-devel-5.3.18-16.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-5.3.18-16.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-5.3.18-16.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-16.1.noarch as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-16.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-5.3.18-16.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64" }, "product_reference": "kernel-syms-rt-5.3.18-16.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-5.3.18-16.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-5.3.18-16.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T13:32:43Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T13:32:43Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T13:32:43Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T13:32:43Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T13:32:43Z", "details": "important" } ], "title": "CVE-2020-24490" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T13:32:43Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T13:32:43Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T13:32:43Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25704" } ], "notes": [ { "category": "general", "text": "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25704", "url": "https://www.suse.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "SUSE Bug 1178393 for CVE-2020-25704", "url": "https://bugzilla.suse.com/1178393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T13:32:43Z", "details": "moderate" } ], "title": "CVE-2020-25704" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T13:32:43Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-28974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28974" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28974", "url": "https://www.suse.com/security/cve/CVE-2020-28974" }, { "category": "external", "summary": "SUSE Bug 1178589 for CVE-2020-28974", "url": "https://bugzilla.suse.com/1178589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T13:32:43Z", "details": "moderate" } ], "title": "CVE-2020-28974" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-16.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-16.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-25T13:32:43Z", "details": "moderate" } ], "title": "CVE-2020-8694" } ] }
wid-sec-w-2024-3745
Vulnerability from csaf_certbund
Published
2020-10-14 22:00
Modified
2025-01-27 23:00
Summary
Linux Kernel - BlueZ: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen im Linux Kernel in BlueZ ausnutzen, um einen Denial of Service Angriff durchzuführen, vertrauliche Daten einzusehen und möglicherweise Code zur Ausführung zu bringen oder seine Privilegien zu erhöhen.
Betroffene Betriebssysteme
- Appliance
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen im Linux Kernel in BlueZ ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, vertrauliche Daten einzusehen und m\u00f6glicherweise Code zur Ausf\u00fchrung zu bringen oder seine Privilegien zu erh\u00f6hen.", "title": "Angriff" }, { "category": "general", "text": "- Appliance\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3745 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2024-3745.json" }, { "category": "self", "summary": "WID-SEC-2024-3745 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3745" }, { "category": "external", "summary": "Meldung auf github vom 2020-10-14", "url": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq" }, { "category": "external", "summary": "Meldung auf github vom 2020-10-14", "url": "https://github.com/google/security-research/security/advisories/GHSA-ccx2-w2r4-x649" }, { "category": "external", "summary": "Meldung auf github vom 2020-10-14", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "Intel Advisory INTEL-SA-00435 vom 2020-10-13", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202010-2 vom 2020-10-18", "url": "https://security.archlinux.org/ASA-202010-2" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202010-3 vom 2020-10-18", "url": "https://security.archlinux.org/ASA-202010-3" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202010-4 vom 2020-10-18", "url": "https://security.archlinux.org/ASA-202010-4" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202010-9 vom 2020-10-18", "url": "https://security.archlinux.org/ASA-202010-9" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4592-1 vom 2020-10-20", "url": "https://ubuntu.com/security/notices/USN-4592-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4279 vom 2020-10-19", "url": "https://access.redhat.com/errata/RHSA-2020:4279" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4277 vom 2020-10-19", "url": "https://access.redhat.com/errata/RHSA-2020:4277" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4278 vom 2020-10-19", "url": "https://access.redhat.com/errata/RHSA-2020:4278" }, { "category": "external", "summary": "Debian Security Advisory DSA-4774 vom 2020-10-19", "url": "https://lists.debian.org/debian-security-announce/2020/msg00181.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4591-1 vom 2020-10-20", "url": "https://ubuntu.com/security/notices/USN-4591-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4281 vom 2020-10-19", "url": "https://access.redhat.com/errata/RHSA-2020:4281" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4280 vom 2020-10-19", "url": "https://access.redhat.com/errata/RHSA-2020:4280" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4288 vom 2020-10-20", "url": "https://access.redhat.com/errata/RHSA-2020:4288" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4287 vom 2020-10-20", "url": "https://access.redhat.com/errata/RHSA-2020:4287" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4286 vom 2020-10-20", "url": "https://access.redhat.com/errata/RHSA-2020:4286" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4289 vom 2020-10-20", "url": "https://access.redhat.com/errata/RHSA-2020:4289" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4276 vom 2020-10-20", "url": "https://access.redhat.com/errata/RHSA-2020:4276" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2972-1 vom 2020-10-20", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-October/007595.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2972-1 vom 2020-10-20", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-October/007592.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2980-1 vom 2020-10-21", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-October/007603.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2981-1 vom 2020-10-21", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2981-1 vom 2020-10-21", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-October/007604.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2980-1 vom 2020-10-21", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2020-4276 vom 2020-10-24", "url": "http://linux.oracle.com/errata/ELSA-2020-4276.html" }, { "category": "external", "summary": "Ubuntu Security Notice LSN-0073-1 vom 2020-10-26", "url": "https://usn.ubuntu.com/lsn/0073-1/" }, { "category": "external", "summary": "Debian Security Advisory DLA-2417 vom 2020-10-28", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202010/msg00028.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2420 vom 2020-10-30", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202010/msg00032.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2420 vom 2020-10-31", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202010/msg00034.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4685 vom 2020-11-04", "url": "https://access.redhat.com/errata/RHSA-2020:4685" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4686 vom 2020-11-04", "url": "https://access.redhat.com/errata/RHSA-2020:4686" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4990 vom 2020-11-10", "url": "https://access.redhat.com/errata/RHSA-2020:4990" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4991 vom 2020-11-10", "url": "https://access.redhat.com/errata/RHSA-2020:4991" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2020-146 vom 2020-11-09", "url": "https://downloads.avaya.com/css/P8/documents/101072132" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3281-1 vom 2020-11-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2020-5023 vom 2020-11-12", "url": "http://linux.oracle.com/errata/ELSA-2020-5023.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2020-4685 vom 2020-11-14", "url": "http://linux.oracle.com/errata/ELSA-2020-4685.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3402-1 vom 2020-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007803.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3389-1 vom 2020-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007798.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3449-1 vom 2020-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007816.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3400-1 vom 2020-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007802.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3441-1 vom 2020-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007817.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3484-1 vom 2020-11-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3491-1 vom 2020-11-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3501-1 vom 2020-11-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3503-1 vom 2020-11-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3513-1 vom 2020-11-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3522-1 vom 2020-11-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3512-1 vom 2020-11-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3532-1 vom 2020-11-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007874.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3532-1 vom 2020-11-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3544-1 vom 2020-11-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3544-1 vom 2020-11-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007878.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4657-1 vom 2020-12-02", "url": "https://ubuntu.com/security/notices/USN-4657-1" }, { "category": "external", "summary": "IGEL Security Notice ISN-2020-10 vom 2020-12-08", "url": "https://kb.igel.com/securitysafety/en/isn-2020-10-igel-os-bluetooth-vulnerabilities-38475251.html" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2020-145 vom 2020-12-08", "url": "https://downloads.avaya.com/css/P8/documents/101072821" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2020-154 vom 2020-12-08", "url": "https://downloads.avaya.com/css/P8/documents/101072833" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2020-5996 vom 2020-12-15", "url": "http://linux.oracle.com/errata/ELSA-2020-5996.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2020-5995 vom 2020-12-15", "url": "http://linux.oracle.com/errata/ELSA-2020-5995.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9008 vom 2021-01-12", "url": "https://linux.oracle.com/errata/ELSA-2021-9008.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9007 vom 2021-01-13", "url": "http://linux.oracle.com/errata/ELSA-2021-9007.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4752-1 vom 2021-02-25", "url": "https://ubuntu.com/security/notices/USN-4752-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9346 vom 2021-07-02", "url": "https://linux.oracle.com/errata/ELSA-2021-9346.html" }, { "category": "external", "summary": "ORACLE OVMSA-2021-0022 vom 2021-07-07", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2021-July/001023.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7179-1 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7179-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7179-2 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7179-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7186-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7183-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7183-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7179-3 vom 2025-01-07", "url": "https://ubuntu.com/security/notices/USN-7179-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-2 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7186-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7179-4 vom 2025-01-27", "url": "https://ubuntu.com/security/notices/USN-7179-4" } ], "source_lang": "en-US", "title": "Linux Kernel - BlueZ: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-01-27T23:00:00.000+00:00", "generator": { "date": "2025-01-28T09:21:30.078+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-3745", "initial_release_date": "2020-10-14T22:00:00.000+00:00", "revision_history": [ { "date": "2020-10-14T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-10-18T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Arch Linux aufgenommen" }, { "date": "2020-10-19T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu, Red Hat und Debian aufgenommen" }, { "date": "2020-10-20T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-10-21T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-10-25T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2020-10-26T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2020-10-28T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-11-01T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-11-03T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-11-09T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-11-10T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2020-11-11T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2020-11-15T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2020-11-19T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-11-23T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-11-24T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-11-25T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-11-26T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-12-01T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2020-12-08T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von IGEL aufgenommen" }, { "date": "2020-12-09T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2020-12-14T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-01-12T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-02-24T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2021-07-01T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-07-07T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2024-12-22T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-07T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-27T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "32" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } }, { "category": "product_name", "name": "Avaya Web License Manager", "product": { "name": "Avaya Web License Manager", "product_id": "T016243", "product_identification_helper": { "cpe": "cpe:/a:avaya:web_license_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "IGEL OS", "product": { "name": "IGEL OS", "product_id": "T017865", "product_identification_helper": { "cpe": "cpe:/o:igel:os:-" } } } ], "category": "vendor", "name": "IGEL" }, { "branches": [ { "category": "product_name", "name": "Open Source Arch Linux", "product": { "name": "Open Source Arch Linux", "product_id": "T013312", "product_identification_helper": { "cpe": "cpe:/o:archlinux:archlinux:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c5.10", "product": { "name": "Open Source Linux Kernel \u003c5.10", "product_id": "724839" } }, { "category": "product_version", "name": "5.1", "product": { "name": "Open Source Linux Kernel 5.10", "product_id": "724839-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.5.10" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12351", "notes": [ { "category": "description", "text": "Im Linux Kernel existieren mehrere Schwachstellen in BlueZ, der Bluetooth Implementierung. Sie beruhen auf Fehlern bei der Behandlung von L2CAP Paketen mit A2MP CID, bei der Behandlung verschiedener AMP Pakete und bei der Behandlung von Eingaben im HCI event. Ein Angreifer innerhalb der Bluetooth Reichweite kann dieses nutzen und einen Denial of Service verursachen, vertrauliche Daten einsehen, m\u00f6glicherweise Code zur Ausf\u00fchrung bringen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T015518", "67646", "T015516", "T013312", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T017865", "T000126", "724839" ] }, "release_date": "2020-10-14T22:00:00.000+00:00", "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "notes": [ { "category": "description", "text": "Im Linux Kernel existieren mehrere Schwachstellen in BlueZ, der Bluetooth Implementierung. Sie beruhen auf Fehlern bei der Behandlung von L2CAP Paketen mit A2MP CID, bei der Behandlung verschiedener AMP Pakete und bei der Behandlung von Eingaben im HCI event. Ein Angreifer innerhalb der Bluetooth Reichweite kann dieses nutzen und einen Denial of Service verursachen, vertrauliche Daten einsehen, m\u00f6glicherweise Code zur Ausf\u00fchrung bringen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T015518", "67646", "T015516", "T013312", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T017865", "T000126", "724839" ] }, "release_date": "2020-10-14T22:00:00.000+00:00", "title": "CVE-2020-12352" }, { "cve": "CVE-2020-24490", "notes": [ { "category": "description", "text": "Im Linux Kernel existieren mehrere Schwachstellen in BlueZ, der Bluetooth Implementierung. Sie beruhen auf Fehlern bei der Behandlung von L2CAP Paketen mit A2MP CID, bei der Behandlung verschiedener AMP Pakete und bei der Behandlung von Eingaben im HCI event. Ein Angreifer innerhalb der Bluetooth Reichweite kann dieses nutzen und einen Denial of Service verursachen, vertrauliche Daten einsehen, m\u00f6glicherweise Code zur Ausf\u00fchrung bringen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T015518", "67646", "T015516", "T013312", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T017865", "T000126", "724839" ] }, "release_date": "2020-10-14T22:00:00.000+00:00", "title": "CVE-2020-24490" } ] }
fkie_cve-2020-12351
Vulnerability from fkie_nvd
Published
2020-11-23 17:15
Modified
2024-11-21 04:59
Severity ?
Summary
Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
References
▶ | URL | Tags | |
---|---|---|---|
secure@intel.com | http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html | Exploit, Third Party Advisory, VDB Entry | |
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | 5.9.0 | |
linux | linux_kernel | 5.9.0 | |
linux | linux_kernel | 5.9.0 | |
linux | linux_kernel | 5.9.0 | |
linux | linux_kernel | 5.9.0 | |
linux | linux_kernel | 5.9.0 | |
linux | linux_kernel | 5.9.0 | |
linux | linux_kernel | 5.9.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "08773B20-01AF-4061-8951-B595A37CFB4B", "versionEndExcluding": "4.9.240", "versionStartIncluding": "4.7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E2D7A7E-D935-4817-8AE4-66DED8AA8A2D", "versionEndExcluding": "4.14.202", "versionStartIncluding": "4.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "66F89D5B-1E6E-4A87-A6A1-A4B7C283657A", "versionEndExcluding": "4.19.152", "versionStartIncluding": "4.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA6369D1-CCFF-4758-8837-FA53432ECB57", "versionEndExcluding": "5.4.72", "versionStartIncluding": "4.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "24B20F22-E73D-4739-8952-F751BC0027A9", "versionEndExcluding": "5.8.16", "versionStartIncluding": "5.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.9.0:-:*:*:*:*:*:*", "matchCriteriaId": "B2C150C3-165E-42D6-80D4-87B11340B08C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "21F51360-AF61-433B-9FD9-D7DE742FABF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "AFF43A64-F1B2-49B5-9B1A-3C5287E30CC7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "7CD5DFA0-15FB-44C2-8C2F-DCABACB998B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "DEA3DDD5-5114-44C0-8805-0A0579BB0034", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "573B49F4-C6E1-4032-B46F-70506FE98562", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "78F80706-7471-472D-B9A8-ABDB3C714B4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "162E532B-A9E5-4483-B71E-E2D7EEBE3F33", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada incorrecta en BlueZ puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente" } ], "id": "CVE-2020-12351", "lastModified": "2024-11-21T04:59:33.433", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-23T17:15:12.250", "references": [ { "source": "secure@intel.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
rhsa-2020:4278
Vulnerability from csaf_redhat
Published
2020-10-19 15:50
Modified
2025-08-02 13:35
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)\n\n* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4278", "url": "https://access.redhat.com/errata/RHSA-2020:4278" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4278.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T13:35:23+00:00", "generator": { "date": "2025-08-02T13:35:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:4278", "initial_release_date": "2020-10-19T15:50:31+00:00", "revision_history": [ { "date": "2020-10-19T15:50:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-19T15:50:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T13:35:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.77.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.77.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.77.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.77.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.77.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.77.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.77.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.77.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-693.77.1.el7.x86_64", "product_id": "kernel-0:3.10.0-693.77.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.77.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.77.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.77.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.77.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.77.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.77.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.77.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.77.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-693.77.1.el7.x86_64", "product_id": "perf-0:3.10.0-693.77.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.77.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.77.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-693.77.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-693.77.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.77.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.77.1.el7.src", "product": { "name": "kernel-0:3.10.0-693.77.1.el7.src", "product_id": "kernel-0:3.10.0-693.77.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.77.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.77.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-693.77.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-693.77.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-693.77.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.77.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.77.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.77.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.77.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.77.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.77.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.77.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.77.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.77.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "kernel-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.77.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.77.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.77.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.77.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.77.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.77.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.77.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "perf-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "perf-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.77.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.77.1.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-693.77.1.el7.ppc64le", "product_id": "python-perf-0:3.10.0-693.77.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.77.1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.77.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.77.1.el7.src", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.77.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.77.1.el7.noarch", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.77.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.77.1.el7.src", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.77.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.77.1.el7.noarch", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.77.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.77.1.el7.src", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.77.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.77.1.el7.noarch", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.77.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.77.1.el7.src", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.77.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.77.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.77.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.77.1.el7.src", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.77.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.77.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.77.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.77.1.el7.src", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.77.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.77.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12351", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886521" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u2019s Bluetooth implementation handled L2CAP (Logical Link Control and Adaptation Protocol) packets with A2MP (Alternate MAC-PHY Manager Protocol) CID (Channel Identifier). This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: type confusion while processing AMP packets", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 is affected starting with the Red Hat Enterprise Linux 7.4 GA kernel version 3.10.0-693 onward.\n\nFor Red Hat OpenShift Container Platform, while the cluster nodes may be running an underlying kernel that\u0027s affected by this flaw present, both virtual and physical hosts in a production environment will generally have the mitigation already in place of having Bluetooth hardware either not present, or not enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" ], "known_not_affected": [ "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "RHBZ#1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq", "url": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" }, { "category": "external", "summary": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/", "url": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-19T15:50:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4278" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net: bluetooth: type confusion while processing AMP packets" }, { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12352", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886529" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the way Linux kernel\u2019s Bluetooth stack implementation handled initialization of stack memory when handling certain AMP (Alternate MAC-PHY Manager Protocol) packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: information leak when processing certain AMP packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" ], "known_not_affected": [ "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "RHBZ#1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12352", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-19T15:50:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4278" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.ppc64le", "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.src", "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.77.1.el7.noarch", "7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.77.1.el7.x86_64", "7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.77.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: bluetooth: information leak when processing certain AMP packets" } ] }
rhsa-2020:4276
Vulnerability from csaf_redhat
Published
2020-10-20 11:15
Modified
2025-08-02 13:35
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)\n\n* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4276", "url": "https://access.redhat.com/errata/RHSA-2020:4276" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4276.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T13:35:39+00:00", "generator": { "date": "2025-08-02T13:35:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:4276", "initial_release_date": "2020-10-20T11:15:46+00:00", "revision_history": [ { "date": "2020-10-20T11:15:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-20T11:15:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T13:35:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "bpftool-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "bpftool-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "kernel-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "kernel-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "perf-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "perf-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "python-perf-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.2.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.2.2.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-1160.2.2.el7.src", "product": { "name": "kernel-0:3.10.0-1160.2.2.el7.src", "product_id": "kernel-0:3.10.0-1160.2.2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.2.2.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.2.2.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "product_id": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.2.2.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "bpftool-0:3.10.0-1160.2.2.el7.s390x", "product_id": "bpftool-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.2.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "kernel-0:3.10.0-1160.2.2.el7.s390x", "product_id": "kernel-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.2.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "product_id": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.2.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.2.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "product_id": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.2.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "product_id": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.2.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.2.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.2.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "perf-0:3.10.0-1160.2.2.el7.s390x", "product_id": "perf-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1160.2.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "python-perf-0:3.10.0-1160.2.2.el7.s390x", "product_id": "python-perf-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.2.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product_id": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.2.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.2.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.2.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.2.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.2.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.2.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.2.2.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "bpftool-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "kernel-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "perf-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "perf-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "python-perf-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.2.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.2.2.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "kernel-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "perf-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "perf-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.2.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.2.2.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12351", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886521" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u2019s Bluetooth implementation handled L2CAP (Logical Link Control and Adaptation Protocol) packets with A2MP (Alternate MAC-PHY Manager Protocol) CID (Channel Identifier). This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: type confusion while processing AMP packets", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 is affected starting with the Red Hat Enterprise Linux 7.4 GA kernel version 3.10.0-693 onward.\n\nFor Red Hat OpenShift Container Platform, while the cluster nodes may be running an underlying kernel that\u0027s affected by this flaw present, both virtual and physical hosts in a production environment will generally have the mitigation already in place of having Bluetooth hardware either not present, or not enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" ], "known_not_affected": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "RHBZ#1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq", "url": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" }, { "category": "external", "summary": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/", "url": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T11:15:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4276" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net: bluetooth: type confusion while processing AMP packets" }, { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12352", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886529" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the way Linux kernel\u2019s Bluetooth stack implementation handled initialization of stack memory when handling certain AMP (Alternate MAC-PHY Manager Protocol) packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: information leak when processing certain AMP packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" ], "known_not_affected": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "RHBZ#1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12352", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T11:15:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4276" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.2.2.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.2.2.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.2.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: bluetooth: information leak when processing certain AMP packets" } ] }
rhsa-2020:4288
Vulnerability from csaf_redhat
Published
2020-10-20 08:32
Modified
2025-08-02 13:35
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)\n\n* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4288", "url": "https://access.redhat.com/errata/RHSA-2020:4288" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4288.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T13:35:58+00:00", "generator": { "date": "2025-08-02T13:35:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:4288", "initial_release_date": "2020-10-20T08:32:36+00:00", "revision_history": [ { "date": "2020-10-20T08:32:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-20T08:32:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T13:35:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.0::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "bpftool-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "bpftool-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-core-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-core-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-debug-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-debug-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-debug-core-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-devel-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-devel-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-headers-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-headers-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-modules-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-modules-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-tools-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-tools-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "perf-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "perf-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "python3-perf-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "python3-perf-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.30.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.30.1.el8_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "bpftool-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "bpftool-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-core-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-core-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-debug-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-tools-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "perf-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "perf-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "python3-perf-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "python3-perf-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.30.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.30.1.el8_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-80.30.1.el8_0.src", "product": { "name": "kernel-0:4.18.0-80.30.1.el8_0.src", "product_id": "kernel-0:4.18.0-80.30.1.el8_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-80.30.1.el8_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-80.30.1.el8_0.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-80.30.1.el8_0.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-80.30.1.el8_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-80.30.1.el8_0?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-80.30.1.el8_0.noarch", "product": { "name": "kernel-doc-0:4.18.0-80.30.1.el8_0.noarch", "product_id": "kernel-doc-0:4.18.0-80.30.1.el8_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-80.30.1.el8_0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "bpftool-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "bpftool-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.30.1.el8_0.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.src" }, "product_reference": "kernel-0:4.18.0-80.30.1.el8_0.src", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-80.30.1.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.30.1.el8_0.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-80.30.1.el8_0.noarch", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-core-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-80.30.1.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.30.1.el8_0.noarch" }, "product_reference": "kernel-doc-0:4.18.0-80.30.1.el8_0.noarch", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "perf-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "perf-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "python3-perf-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12351", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886521" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u2019s Bluetooth implementation handled L2CAP (Logical Link Control and Adaptation Protocol) packets with A2MP (Alternate MAC-PHY Manager Protocol) CID (Channel Identifier). This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: type confusion while processing AMP packets", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 is affected starting with the Red Hat Enterprise Linux 7.4 GA kernel version 3.10.0-693 onward.\n\nFor Red Hat OpenShift Container Platform, while the cluster nodes may be running an underlying kernel that\u0027s affected by this flaw present, both virtual and physical hosts in a production environment will generally have the mitigation already in place of having Bluetooth hardware either not present, or not enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.30.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.30.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64" ], "known_not_affected": [ "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "RHBZ#1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq", "url": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" }, { "category": "external", "summary": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/", "url": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T08:32:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.30.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.30.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4288" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.30.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.30.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.30.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.30.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net: bluetooth: type confusion while processing AMP packets" }, { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12352", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886529" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the way Linux kernel\u2019s Bluetooth stack implementation handled initialization of stack memory when handling certain AMP (Alternate MAC-PHY Manager Protocol) packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: information leak when processing certain AMP packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.30.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.30.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64" ], "known_not_affected": [ "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "RHBZ#1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12352", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T08:32:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.30.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.30.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4288" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.30.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.30.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.30.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.30.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.30.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.30.1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: bluetooth: information leak when processing certain AMP packets" } ] }
rhsa-2020:4277
Vulnerability from csaf_redhat
Published
2020-10-19 17:24
Modified
2025-08-02 13:35
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)\n\n* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4277", "url": "https://access.redhat.com/errata/RHSA-2020:4277" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4277.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T13:35:31+00:00", "generator": { "date": "2025-08-02T13:35:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:4277", "initial_release_date": "2020-10-19T17:24:14+00:00", "revision_history": [ { "date": "2020-10-19T17:24:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-19T17:24:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T13:35:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "bpftool-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "bpftool-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "kernel-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "perf-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.37.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.37.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-1062.37.1.el7.src", "product": { "name": "kernel-0:3.10.0-1062.37.1.el7.src", "product_id": "kernel-0:3.10.0-1062.37.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.37.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.37.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.37.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "bpftool-0:3.10.0-1062.37.1.el7.s390x", "product_id": "bpftool-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.37.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "kernel-0:3.10.0-1062.37.1.el7.s390x", "product_id": "kernel-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.37.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "product_id": "kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.37.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.37.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "product_id": "kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.37.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "product_id": "kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.37.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1062.37.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1062.37.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "perf-0:3.10.0-1062.37.1.el7.s390x", "product_id": "perf-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1062.37.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "python-perf-0:3.10.0-1062.37.1.el7.s390x", "product_id": "python-perf-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.37.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product_id": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.37.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.37.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.37.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1062.37.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1062.37.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.37.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.37.1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "bpftool-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "bpftool-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "kernel-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "kernel-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "perf-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "perf-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "python-perf-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.37.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.37.1.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "kernel-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "perf-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "perf-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.37.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.37.1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.src", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1062.37.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1062.37.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.src", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1062.37.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.src", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1062.37.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12351", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886521" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u2019s Bluetooth implementation handled L2CAP (Logical Link Control and Adaptation Protocol) packets with A2MP (Alternate MAC-PHY Manager Protocol) CID (Channel Identifier). This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: type confusion while processing AMP packets", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 is affected starting with the Red Hat Enterprise Linux 7.4 GA kernel version 3.10.0-693 onward.\n\nFor Red Hat OpenShift Container Platform, while the cluster nodes may be running an underlying kernel that\u0027s affected by this flaw present, both virtual and physical hosts in a production environment will generally have the mitigation already in place of having Bluetooth hardware either not present, or not enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" ], "known_not_affected": [ "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "RHBZ#1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq", "url": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" }, { "category": "external", "summary": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/", "url": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-19T17:24:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4277" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net: bluetooth: type confusion while processing AMP packets" }, { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12352", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886529" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the way Linux kernel\u2019s Bluetooth stack implementation handled initialization of stack memory when handling certain AMP (Alternate MAC-PHY Manager Protocol) packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: information leak when processing certain AMP packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" ], "known_not_affected": [ "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "RHBZ#1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12352", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-19T17:24:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4277" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7ComputeNode-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7ComputeNode-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7ComputeNode-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7Server-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:bpftool-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:bpftool-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.src", "7Server-optional-7.7.EUS:kernel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-abi-whitelists-0:3.10.0-1062.37.1.el7.noarch", "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-bootwrapper-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debug-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-debuginfo-common-s390x-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-doc-0:3.10.0-1062.37.1.el7.noarch", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-headers-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-kdump-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-kdump-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-kdump-devel-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-libs-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:kernel-tools-libs-devel-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:python-perf-0:3.10.0-1062.37.1.el7.x86_64", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.ppc64le", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.s390x", "7Server-optional-7.7.EUS:python-perf-debuginfo-0:3.10.0-1062.37.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: bluetooth: information leak when processing certain AMP packets" } ] }
rhsa-2020:4281
Vulnerability from csaf_redhat
Published
2020-10-19 17:09
Modified
2025-08-02 13:34
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)\n\n* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4281", "url": "https://access.redhat.com/errata/RHSA-2020:4281" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4281.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T13:34:51+00:00", "generator": { "date": "2025-08-02T13:34:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:4281", "initial_release_date": "2020-10-19T17:09:42+00:00", "revision_history": [ { "date": "2020-10-19T17:09:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-19T17:09:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T13:34:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product": { "name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.61.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.61.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.61.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.61.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.61.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.61.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.61.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "bpftool-0:3.10.0-957.61.2.el7.x86_64", "product_id": "bpftool-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-957.61.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "kernel-0:3.10.0-957.61.2.el7.x86_64", "product_id": "kernel-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-957.61.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.61.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.61.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.61.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.61.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.61.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.61.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "perf-0:3.10.0-957.61.2.el7.x86_64", "product_id": "perf-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-957.61.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-957.61.2.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-957.61.2.el7.x86_64", "product_id": "python-perf-0:3.10.0-957.61.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.61.2.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.61.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.61.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.61.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.61.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.61.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.61.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.61.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.61.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "kernel-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-957.61.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.61.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.61.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.61.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.61.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.61.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.61.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "perf-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "perf-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-957.61.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-957.61.2.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-957.61.2.el7.ppc64le", "product_id": "python-perf-0:3.10.0-957.61.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.61.2.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.61.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.61.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.61.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-957.61.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.61.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.61.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.61.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "kernel-0:3.10.0-957.61.2.el7.ppc64", "product_id": "kernel-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-957.61.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.61.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.61.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.61.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.61.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.61.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.61.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.61.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "perf-0:3.10.0-957.61.2.el7.ppc64", "product_id": "perf-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-957.61.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-957.61.2.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-957.61.2.el7.ppc64", "product_id": "python-perf-0:3.10.0-957.61.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.61.2.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-957.61.2.el7.src", "product": { "name": "kernel-0:3.10.0-957.61.2.el7.src", "product_id": "kernel-0:3.10.0-957.61.2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-957.61.2.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.61.2.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-957.61.2.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-957.61.2.el7.noarch", "product_id": "kernel-doc-0:3.10.0-957.61.2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.61.2.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-957.61.2.el7.s390x", "product": { "name": "kernel-0:3.10.0-957.61.2.el7.s390x", "product_id": "kernel-0:3.10.0-957.61.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-957.61.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-957.61.2.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.s390x", "product_id": "kernel-debug-0:3.10.0-957.61.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.61.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.61.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-957.61.2.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.s390x", "product_id": "kernel-devel-0:3.10.0-957.61.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.61.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-957.61.2.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.s390x", "product_id": "kernel-headers-0:3.10.0-957.61.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.61.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-957.61.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-957.61.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-957.61.2.el7.s390x", "product": { "name": "perf-0:3.10.0-957.61.2.el7.s390x", "product_id": "perf-0:3.10.0-957.61.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-957.61.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-957.61.2.el7.s390x", "product": { "name": "python-perf-0:3.10.0-957.61.2.el7.s390x", "product_id": "python-perf-0:3.10.0-957.61.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.61.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.61.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.61.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-957.61.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-957.61.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.61.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.61.2.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.src", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.61.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.61.2.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.61.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.61.2.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.src as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.src" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.src", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.61.2.el7.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.61.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.61.2.el7.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS", "product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.src", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.61.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.61.2.el7.noarch", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.src", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.61.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.61.2.el7.noarch", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12351", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886521" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u2019s Bluetooth implementation handled L2CAP (Logical Link Control and Adaptation Protocol) packets with A2MP (Alternate MAC-PHY Manager Protocol) CID (Channel Identifier). This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: type confusion while processing AMP packets", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 is affected starting with the Red Hat Enterprise Linux 7.4 GA kernel version 3.10.0-693 onward.\n\nFor Red Hat OpenShift Container Platform, while the cluster nodes may be running an underlying kernel that\u0027s affected by this flaw present, both virtual and physical hosts in a production environment will generally have the mitigation already in place of having Bluetooth hardware either not present, or not enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.src", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" ], "known_not_affected": [ "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "RHBZ#1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq", "url": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" }, { "category": "external", "summary": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/", "url": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-19T17:09:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.src", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4281" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.src", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.src", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net: bluetooth: type confusion while processing AMP packets" }, { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12352", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886529" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the way Linux kernel\u2019s Bluetooth stack implementation handled initialization of stack memory when handling certain AMP (Alternate MAC-PHY Manager Protocol) packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: information leak when processing certain AMP packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.src", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" ], "known_not_affected": [ "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "RHBZ#1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12352", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-19T17:09:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.src", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4281" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.src", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.src", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7Server-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.src", "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.61.2.el7.noarch", "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.61.2.el7.noarch", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.61.2.el7.x86_64", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.ppc64le", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.s390x", "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.61.2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: bluetooth: information leak when processing certain AMP packets" } ] }
rhsa-2020:4287
Vulnerability from csaf_redhat
Published
2020-10-20 08:41
Modified
2025-08-02 13:35
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)
* kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)
* kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege (CVE-2020-14386)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* NFS client autodisconnect timer may fire immediately after TCP connection setup and may cause DoS type reconnect problem in complex network environments (BZ#1873571)
* hang on full fs from trace_cmd (BZ#1875789)
* Secure boot key is not loaded with kernel-4.18.0-232.el8.x86_64 / shim-x64-15-15 (BZ#1877527)
* [RHEL-8.3] Kdump failed to start when secure boot enabled: kexec_file_load failed: Required key not available (BZ#1877529)
* [RHEL-8.3] Kdump/kexec kernel panicked on EFI boot: general protection fault: 0000 [#1] SMP PTI (BZ#1879987)
* [conntrack] udp packet reverse NAT occasionally fail when race condition request combination with the DNAT load balancing rules (BZ#1882096)
* [Regression] RHEL8.3 Beta - Do not initiate shutdown for EPOW_SHUTDOWN_ON_UPS event (BZ#1882244)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)\n\n* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)\n\n* kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)\n\n* kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege (CVE-2020-14386)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* NFS client autodisconnect timer may fire immediately after TCP connection setup and may cause DoS type reconnect problem in complex network environments (BZ#1873571)\n\n* hang on full fs from trace_cmd (BZ#1875789)\n\n* Secure boot key is not loaded with kernel-4.18.0-232.el8.x86_64 / shim-x64-15-15 (BZ#1877527)\n\n* [RHEL-8.3] Kdump failed to start when secure boot enabled: kexec_file_load failed: Required key not available (BZ#1877529)\n\n* [RHEL-8.3] Kdump/kexec kernel panicked on EFI boot: general protection fault: 0000 [#1] SMP PTI (BZ#1879987)\n\n* [conntrack] udp packet reverse NAT occasionally fail when race condition request combination with the DNAT load balancing rules (BZ#1882096)\n\n* [Regression] RHEL8.3 Beta - Do not initiate shutdown for EPOW_SHUTDOWN_ON_UPS event (BZ#1882244)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4287", "url": "https://access.redhat.com/errata/RHSA-2020:4287" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "1874800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874800" }, { "category": "external", "summary": "1875699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875699" }, { "category": "external", "summary": "1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4287.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T13:35:14+00:00", "generator": { "date": "2025-08-02T13:35:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:4287", "initial_release_date": "2020-10-20T08:41:39+00:00", "revision_history": [ { "date": "2020-10-20T08:41:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-20T08:41:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T13:35:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product": { "name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "perf-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "perf-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.32.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "product": { "name": "python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "product_id": "python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.32.1.el8_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "perf-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "perf-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.32.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "product": { "name": "python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "product_id": "python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.32.1.el8_1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "perf-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "perf-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.32.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "product": { "name": "python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "product_id": "python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.32.1.el8_1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "bpftool-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "bpftool-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "perf-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "perf-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.32.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.32.1.el8_1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-147.32.1.el8_1.src", "product": { "name": "kernel-0:4.18.0-147.32.1.el8_1.src", "product_id": "kernel-0:4.18.0-147.32.1.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.32.1.el8_1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.32.1.el8_1?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "product": { "name": "kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "product_id": "kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.32.1.el8_1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "bpftool-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.32.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src" }, "product_reference": "kernel-0:4.18.0-147.32.1.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-147.32.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch" }, "product_reference": "kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "perf-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "perf-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "perf-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "perf-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "bpftool-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.32.1.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src" }, "product_reference": "kernel-0:4.18.0-147.32.1.el8_1.src", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-147.32.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch" }, "product_reference": "kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "perf-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "perf-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "perf-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "perf-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12351", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886521" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u2019s Bluetooth implementation handled L2CAP (Logical Link Control and Adaptation Protocol) packets with A2MP (Alternate MAC-PHY Manager Protocol) CID (Channel Identifier). This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: type confusion while processing AMP packets", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 is affected starting with the Red Hat Enterprise Linux 7.4 GA kernel version 3.10.0-693 onward.\n\nFor Red Hat OpenShift Container Platform, while the cluster nodes may be running an underlying kernel that\u0027s affected by this flaw present, both virtual and physical hosts in a production environment will generally have the mitigation already in place of having Bluetooth hardware either not present, or not enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" ], "known_not_affected": [ "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "RHBZ#1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq", "url": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" }, { "category": "external", "summary": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/", "url": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T08:41:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4287" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net: bluetooth: type confusion while processing AMP packets" }, { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12352", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886529" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the way Linux kernel\u2019s Bluetooth stack implementation handled initialization of stack memory when handling certain AMP (Alternate MAC-PHY Manager Protocol) packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: information leak when processing certain AMP packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" ], "known_not_affected": [ "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "RHBZ#1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12352", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T08:41:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4287" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: bluetooth: information leak when processing certain AMP packets" }, { "acknowledgments": [ { "names": [ "Dr. David Alan Gilbert" ], "organization": "redhat.com" } ], "cve": "CVE-2020-14385", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2020-08-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1874800" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt", "title": "Vulnerability summary" }, { "category": "other", "text": "Only local users, including unprivileged users in a cointainer, can trigger this flaw. However, the impact could be high, especially on multi-tenant systems, because after the attack the system rendered inaccessible for some time (at least until reboot), so the impact has been increased to Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" ], "known_not_affected": [ "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14385" }, { "category": "external", "summary": "RHBZ#1874800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874800" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14385", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14385" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14385", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14385" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933" } ], "release_date": "2020-08-25T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T08:41:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4287" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt" }, { "acknowledgments": [ { "names": [ "Or Cohen" ], "organization": "paloaltonetworks.com" } ], "cve": "CVE-2020-14386", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2020-09-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1875699" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege", "title": "Vulnerability summary" }, { "category": "other", "text": "Only local users with CAP_NET_RAW capability enabled can trigger this issue.\n\nFor OpenShift Container Platform 4, pods in the default restricted SCC are granted CAP_NET_RAW by default. An attacker can exploit this if they can run arbitrary container images on the target cluster.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" ], "known_not_affected": [ "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "RHBZ#1875699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875699" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14386", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14386" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14386", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14386" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2020/q3/146", "url": "https://seclists.org/oss-sec/2020/q3/146" } ], "release_date": "2020-09-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T08:41:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4287" }, { "category": "workaround", "details": "If the CAP_NET_RAW capability disabled by default (which is true for Red Hat Enterprise Linux), then only a privileged user can trigger this bug. The mitigation is to disable CAP_NET_RAW capability for regular users and for executables.\n\nOn Red Hat Enterprise Linux 8 CAP_NET_RAW capability can be also gained by exploiting unprivileged user namespaces. The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOpenShift Container Platform 4.5 and 4.4 this can be mitigated by removing `CAP_NET_RAW` from the default cri-o capabilities provided to pods (NOTE: This may prevent `ping` from working in unprivileged pods. This fix has not been validated for OpenShift 4.3 or below):\n```\napiVersion: machineconfiguration.openshift.io/v1\nkind: MachineConfig\nmetadata:\n labels:\n machineconfiguration.openshift.io/role: worker\n name: 50-reset-crio-capabilities\nspec:\n config:\n ignition:\n version: 2.2.0\n storage:\n files:\n - contents:\n source: data:text/plain;charset=utf-8;base64,W2NyaW8ucnVudGltZV0KZGVmYXVsdF9jYXBhYmlsaXRpZXMgPSBbCiAgICAiQ0hPV04iLAogICAgIkRBQ19PVkVSUklERSIsCiAgICAiRlNFVElEIiwKICAgICJGT1dORVIiLAogICAgIlNFVEdJRCIsCiAgICAiU0VUVUlEIiwKICAgICJTRVRQQ0FQIiwKICAgICJORVRfQklORF9TRVJWSUNFIiwKICAgICJTWVNfQ0hST09UIiwKICAgICJLSUxMIiwKXQo=\n filesystem: root\n mode: 0644\n path: /etc/crio/crio.conf.d/reset-crio-capabilities.conf\n```\n\nCreate this MachineConfig object via e.g. `oc apply`. More information about MachineConfig can be found here: \nhttps://github.com/openshift/machine-config-operator\nhttps://docs.openshift.com/container-platform/4.5/architecture/architecture-rhcos.html\n\nIn order to monitor the rollout of this change, use `oc describe machineconfigpool/worker`.\n\nCheck for any pods which start to crash after this is applied; they may need to be adjusted request `CAP_NET_RAW` explicitly. More information:\nhttps://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-capabilities-for-a-container\nhttps://docs.openshift.com/container-platform/4.5/authentication/managing-security-context-constraints.html", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.32.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.32.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.32.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege" } ] }
rhsa-2020:4286
Vulnerability from csaf_redhat
Published
2020-10-20 08:52
Modified
2025-08-04 07:10
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)
* kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)
* kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege (CVE-2020-14386)
* kernel: kernel: buffer over write in vgacon_scroll (CVE-2020-14331)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [mlx5] stale ethtool steering rules remain after moving back to legacy mode (BZ#1857777)
* 50% cpu in masked_flow_update with pop to pod TCP_RR (BZ#1859216)
* take into account GSO and fragmented packets in execute_check_pkt_len action (BZ#1860169)
* RHEL8.1 - scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (BZ#1866371)
* RHEL8.3 Pre-Beta - smc: SMC connections hang with later-level implementations (BZ#1866390)
* Incorrect pinning of IRQ threads on isolated CPUs by drivers that use cpumask_local_spread() (BZ#1867174)
* [RHEL8] Fixes for DEADLINE scheduler class (BZ#1867612)
* RHEL8.1 - s390/pci: Fix unexpected write combine on resource (BZ#1869276)
* dm multipath: fix spurious failures during IO completion [EIOP-8345] (BZ#1869386)
* IO on virtio-scsi hangs when running cpu hotplug test (BZ#1869779)
* store_rps_map doesn't accept an empty bitmask, which is required for disabling RPS on a queue (BZ#1870181)
* Memory registration cache data corruption possible, fix requires backporting (BZ#1872424)
* fix another case of wait list corruption for PSM/sdma (BZ#1872766)
* [RHEL-8] Segmentation fault (core dumped) when fi_bw -e msg -v -T 1 -p "verbs" (BZ#1872771)
* fix mounting and inode number handling on s390x (BZ#1875787)
* failure to enter nohz_full mode for non SCHED_FIFO tasks (BZ#1877417)
* Secure boot key is not loaded with kernel-4.18.0-232.el8.x86_64 / shim-x64-15-15 (BZ#1877528)
* [RHEL-8.3] Kdump failed to start when secure boot enabled: kexec_file_load failed: Required key not available (BZ#1877530)
* [RHEL-8.3] Kdump/kexec kernel panicked on EFI boot: general protection fault: 0000 [#1] SMP PTI (BZ#1879988)
* Sleeping or scheduling after sched_cpu_dying() led to "scheduling while atomic" and BUG at kernel/cpu.c:907! (BZ#1880081)
* [conntrack] udp packet reverse NAT occasionally fail when race condition request combination with the DNAT load balancing rules (BZ#1882095)
* [Regression] RHEL8.3 Beta - Do not initiate shutdown for EPOW_SHUTDOWN_ON_UPS event (BZ#1882243)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)\n\n* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)\n\n* kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)\n\n* kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege (CVE-2020-14386)\n\n* kernel: kernel: buffer over write in vgacon_scroll (CVE-2020-14331)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [mlx5] stale ethtool steering rules remain after moving back to legacy mode (BZ#1857777)\n\n* 50% cpu in masked_flow_update with pop to pod TCP_RR (BZ#1859216)\n\n* take into account GSO and fragmented packets in execute_check_pkt_len action (BZ#1860169)\n\n* RHEL8.1 - scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (BZ#1866371)\n\n* RHEL8.3 Pre-Beta - smc: SMC connections hang with later-level implementations (BZ#1866390)\n\n* Incorrect pinning of IRQ threads on isolated CPUs by drivers that use cpumask_local_spread() (BZ#1867174)\n\n* [RHEL8] Fixes for DEADLINE scheduler class (BZ#1867612)\n\n* RHEL8.1 - s390/pci: Fix unexpected write combine on resource (BZ#1869276)\n\n* dm multipath: fix spurious failures during IO completion [EIOP-8345] (BZ#1869386)\n\n* IO on virtio-scsi hangs when running cpu hotplug test (BZ#1869779)\n\n* store_rps_map doesn\u0027t accept an empty bitmask, which is required for disabling RPS on a queue (BZ#1870181)\n\n* Memory registration cache data corruption possible, fix requires backporting (BZ#1872424)\n\n* fix another case of wait list corruption for PSM/sdma (BZ#1872766)\n\n* [RHEL-8] Segmentation fault (core dumped) when fi_bw -e msg -v -T 1 -p \"verbs\" (BZ#1872771)\n\n* fix mounting and inode number handling on s390x (BZ#1875787)\n\n* failure to enter nohz_full mode for non SCHED_FIFO tasks (BZ#1877417)\n\n* Secure boot key is not loaded with kernel-4.18.0-232.el8.x86_64 / shim-x64-15-15 (BZ#1877528)\n\n* [RHEL-8.3] Kdump failed to start when secure boot enabled: kexec_file_load failed: Required key not available (BZ#1877530)\n\n* [RHEL-8.3] Kdump/kexec kernel panicked on EFI boot: general protection fault: 0000 [#1] SMP PTI (BZ#1879988)\n\n* Sleeping or scheduling after sched_cpu_dying() led to \"scheduling while atomic\" and BUG at kernel/cpu.c:907! (BZ#1880081)\n\n* [conntrack] udp packet reverse NAT occasionally fail when race condition request combination with the DNAT load balancing rules (BZ#1882095)\n\n* [Regression] RHEL8.3 Beta - Do not initiate shutdown for EPOW_SHUTDOWN_ON_UPS event (BZ#1882243)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4286", "url": "https://access.redhat.com/errata/RHSA-2020:4286" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "1858679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "category": "external", "summary": "1874800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874800" }, { "category": "external", "summary": "1875699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875699" }, { "category": "external", "summary": "1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4286.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-04T07:10:34+00:00", "generator": { "date": "2025-08-04T07:10:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:4286", "initial_release_date": "2020-10-20T08:52:37+00:00", "revision_history": [ { "date": "2020-10-20T08:52:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-20T08:52:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T07:10:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "perf-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "perf-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.28.1.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "perf-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "perf-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.28.1.el8_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "perf-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "perf-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.28.1.el8_2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "bpftool-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "perf-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "perf-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.28.1.el8_2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-193.28.1.el8_2.src", "product": { "name": "kernel-0:4.18.0-193.28.1.el8_2.src", "product_id": "kernel-0:4.18.0-193.28.1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.28.1.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.28.1.el8_2?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "product": { "name": "kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "product_id": "kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.28.1.el8_2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "bpftool-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.28.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "perf-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "perf-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "perf-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "perf-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "bpftool-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.src", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.28.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "perf-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "perf-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "perf-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "perf-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12351", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886521" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u2019s Bluetooth implementation handled L2CAP (Logical Link Control and Adaptation Protocol) packets with A2MP (Alternate MAC-PHY Manager Protocol) CID (Channel Identifier). This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: type confusion while processing AMP packets", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 is affected starting with the Red Hat Enterprise Linux 7.4 GA kernel version 3.10.0-693 onward.\n\nFor Red Hat OpenShift Container Platform, while the cluster nodes may be running an underlying kernel that\u0027s affected by this flaw present, both virtual and physical hosts in a production environment will generally have the mitigation already in place of having Bluetooth hardware either not present, or not enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "RHBZ#1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq", "url": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" }, { "category": "external", "summary": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/", "url": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T08:52:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4286" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net: bluetooth: type confusion while processing AMP packets" }, { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12352", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886529" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the way Linux kernel\u2019s Bluetooth stack implementation handled initialization of stack memory when handling certain AMP (Alternate MAC-PHY Manager Protocol) packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: information leak when processing certain AMP packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "RHBZ#1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12352", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T08:52:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4286" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: bluetooth: information leak when processing certain AMP packets" }, { "acknowledgments": [ { "names": [ "Yunhai Zhang" ], "organization": "NSFOCUS Security Team" } ], "cve": "CVE-2020-14331", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1858679" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kernel: buffer over write in vgacon_scroll", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because only local user with access to VGA console can trigger it (for example if booting with param \"nomodeset\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "RHBZ#1858679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14331", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14331" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14331", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14331" } ], "release_date": "2020-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T08:52:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4286" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: kernel: buffer over write in vgacon_scroll" }, { "acknowledgments": [ { "names": [ "Dr. David Alan Gilbert" ], "organization": "redhat.com" } ], "cve": "CVE-2020-14385", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2020-08-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1874800" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt", "title": "Vulnerability summary" }, { "category": "other", "text": "Only local users, including unprivileged users in a cointainer, can trigger this flaw. However, the impact could be high, especially on multi-tenant systems, because after the attack the system rendered inaccessible for some time (at least until reboot), so the impact has been increased to Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14385" }, { "category": "external", "summary": "RHBZ#1874800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874800" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14385", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14385" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14385", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14385" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933" } ], "release_date": "2020-08-25T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T08:52:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4286" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt" }, { "acknowledgments": [ { "names": [ "Or Cohen" ], "organization": "paloaltonetworks.com" } ], "cve": "CVE-2020-14386", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2020-09-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1875699" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege", "title": "Vulnerability summary" }, { "category": "other", "text": "Only local users with CAP_NET_RAW capability enabled can trigger this issue.\n\nFor OpenShift Container Platform 4, pods in the default restricted SCC are granted CAP_NET_RAW by default. An attacker can exploit this if they can run arbitrary container images on the target cluster.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "RHBZ#1875699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875699" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14386", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14386" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14386", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14386" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2020/q3/146", "url": "https://seclists.org/oss-sec/2020/q3/146" } ], "release_date": "2020-09-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T08:52:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4286" }, { "category": "workaround", "details": "If the CAP_NET_RAW capability disabled by default (which is true for Red Hat Enterprise Linux), then only a privileged user can trigger this bug. The mitigation is to disable CAP_NET_RAW capability for regular users and for executables.\n\nOn Red Hat Enterprise Linux 8 CAP_NET_RAW capability can be also gained by exploiting unprivileged user namespaces. The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOpenShift Container Platform 4.5 and 4.4 this can be mitigated by removing `CAP_NET_RAW` from the default cri-o capabilities provided to pods (NOTE: This may prevent `ping` from working in unprivileged pods. This fix has not been validated for OpenShift 4.3 or below):\n```\napiVersion: machineconfiguration.openshift.io/v1\nkind: MachineConfig\nmetadata:\n labels:\n machineconfiguration.openshift.io/role: worker\n name: 50-reset-crio-capabilities\nspec:\n config:\n ignition:\n version: 2.2.0\n storage:\n files:\n - contents:\n source: data:text/plain;charset=utf-8;base64,W2NyaW8ucnVudGltZV0KZGVmYXVsdF9jYXBhYmlsaXRpZXMgPSBbCiAgICAiQ0hPV04iLAogICAgIkRBQ19PVkVSUklERSIsCiAgICAiRlNFVElEIiwKICAgICJGT1dORVIiLAogICAgIlNFVEdJRCIsCiAgICAiU0VUVUlEIiwKICAgICJTRVRQQ0FQIiwKICAgICJORVRfQklORF9TRVJWSUNFIiwKICAgICJTWVNfQ0hST09UIiwKICAgICJLSUxMIiwKXQo=\n filesystem: root\n mode: 0644\n path: /etc/crio/crio.conf.d/reset-crio-capabilities.conf\n```\n\nCreate this MachineConfig object via e.g. `oc apply`. More information about MachineConfig can be found here: \nhttps://github.com/openshift/machine-config-operator\nhttps://docs.openshift.com/container-platform/4.5/architecture/architecture-rhcos.html\n\nIn order to monitor the rollout of this change, use `oc describe machineconfigpool/worker`.\n\nCheck for any pods which start to crash after this is applied; they may need to be adjusted request `CAP_NET_RAW` explicitly. More information:\nhttps://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-capabilities-for-a-container\nhttps://docs.openshift.com/container-platform/4.5/authentication/managing-security-context-constraints.html", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege" } ] }
rhsa-2020:4289
Vulnerability from csaf_redhat
Published
2020-10-20 09:02
Modified
2025-08-04 07:10
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)
* kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)
* kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege (CVE-2020-14386)
* kernel: kernel: buffer over write in vgacon_scroll (CVE-2020-14331)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update RT source tree to the RHEL-8.2.z Batch#4 source tree (BZ#1877921)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)\n\n* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)\n\n* kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)\n\n* kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege (CVE-2020-14386)\n\n* kernel: kernel: buffer over write in vgacon_scroll (CVE-2020-14331)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.2.z Batch#4 source tree (BZ#1877921)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4289", "url": "https://access.redhat.com/errata/RHSA-2020:4289" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "1858679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "category": "external", "summary": "1874800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874800" }, { "category": "external", "summary": "1875699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875699" }, { "category": "external", "summary": "1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4289.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-04T07:10:27+00:00", "generator": { "date": "2025-08-04T07:10:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:4289", "initial_release_date": "2020-10-20T09:02:14+00:00", "revision_history": [ { "date": "2020-10-20T09:02:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-20T09:02:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T07:10:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "product": { "name": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "product_id": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.28.1.rt13.77.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src" }, "product_reference": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src" }, "product_reference": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12351", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886521" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u2019s Bluetooth implementation handled L2CAP (Logical Link Control and Adaptation Protocol) packets with A2MP (Alternate MAC-PHY Manager Protocol) CID (Channel Identifier). This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: type confusion while processing AMP packets", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 is affected starting with the Red Hat Enterprise Linux 7.4 GA kernel version 3.10.0-693 onward.\n\nFor Red Hat OpenShift Container Platform, while the cluster nodes may be running an underlying kernel that\u0027s affected by this flaw present, both virtual and physical hosts in a production environment will generally have the mitigation already in place of having Bluetooth hardware either not present, or not enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "RHBZ#1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq", "url": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" }, { "category": "external", "summary": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/", "url": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T09:02:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4289" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net: bluetooth: type confusion while processing AMP packets" }, { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12352", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886529" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the way Linux kernel\u2019s Bluetooth stack implementation handled initialization of stack memory when handling certain AMP (Alternate MAC-PHY Manager Protocol) packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: information leak when processing certain AMP packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "RHBZ#1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12352", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T09:02:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4289" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: bluetooth: information leak when processing certain AMP packets" }, { "acknowledgments": [ { "names": [ "Yunhai Zhang" ], "organization": "NSFOCUS Security Team" } ], "cve": "CVE-2020-14331", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1858679" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kernel: buffer over write in vgacon_scroll", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because only local user with access to VGA console can trigger it (for example if booting with param \"nomodeset\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "RHBZ#1858679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14331", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14331" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14331", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14331" } ], "release_date": "2020-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T09:02:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4289" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: kernel: buffer over write in vgacon_scroll" }, { "acknowledgments": [ { "names": [ "Dr. David Alan Gilbert" ], "organization": "redhat.com" } ], "cve": "CVE-2020-14385", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2020-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1874800" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt", "title": "Vulnerability summary" }, { "category": "other", "text": "Only local users, including unprivileged users in a cointainer, can trigger this flaw. However, the impact could be high, especially on multi-tenant systems, because after the attack the system rendered inaccessible for some time (at least until reboot), so the impact has been increased to Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14385" }, { "category": "external", "summary": "RHBZ#1874800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874800" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14385", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14385" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14385", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14385" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933" } ], "release_date": "2020-08-25T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T09:02:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4289" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt" }, { "acknowledgments": [ { "names": [ "Or Cohen" ], "organization": "paloaltonetworks.com" } ], "cve": "CVE-2020-14386", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2020-09-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1875699" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege", "title": "Vulnerability summary" }, { "category": "other", "text": "Only local users with CAP_NET_RAW capability enabled can trigger this issue.\n\nFor OpenShift Container Platform 4, pods in the default restricted SCC are granted CAP_NET_RAW by default. An attacker can exploit this if they can run arbitrary container images on the target cluster.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "RHBZ#1875699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875699" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14386", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14386" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14386", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14386" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2020/q3/146", "url": "https://seclists.org/oss-sec/2020/q3/146" } ], "release_date": "2020-09-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T09:02:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4289" }, { "category": "workaround", "details": "If the CAP_NET_RAW capability disabled by default (which is true for Red Hat Enterprise Linux), then only a privileged user can trigger this bug. The mitigation is to disable CAP_NET_RAW capability for regular users and for executables.\n\nOn Red Hat Enterprise Linux 8 CAP_NET_RAW capability can be also gained by exploiting unprivileged user namespaces. The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOpenShift Container Platform 4.5 and 4.4 this can be mitigated by removing `CAP_NET_RAW` from the default cri-o capabilities provided to pods (NOTE: This may prevent `ping` from working in unprivileged pods. This fix has not been validated for OpenShift 4.3 or below):\n```\napiVersion: machineconfiguration.openshift.io/v1\nkind: MachineConfig\nmetadata:\n labels:\n machineconfiguration.openshift.io/role: worker\n name: 50-reset-crio-capabilities\nspec:\n config:\n ignition:\n version: 2.2.0\n storage:\n files:\n - contents:\n source: data:text/plain;charset=utf-8;base64,W2NyaW8ucnVudGltZV0KZGVmYXVsdF9jYXBhYmlsaXRpZXMgPSBbCiAgICAiQ0hPV04iLAogICAgIkRBQ19PVkVSUklERSIsCiAgICAiRlNFVElEIiwKICAgICJGT1dORVIiLAogICAgIlNFVEdJRCIsCiAgICAiU0VUVUlEIiwKICAgICJTRVRQQ0FQIiwKICAgICJORVRfQklORF9TRVJWSUNFIiwKICAgICJTWVNfQ0hST09UIiwKICAgICJLSUxMIiwKXQo=\n filesystem: root\n mode: 0644\n path: /etc/crio/crio.conf.d/reset-crio-capabilities.conf\n```\n\nCreate this MachineConfig object via e.g. `oc apply`. More information about MachineConfig can be found here: \nhttps://github.com/openshift/machine-config-operator\nhttps://docs.openshift.com/container-platform/4.5/architecture/architecture-rhcos.html\n\nIn order to monitor the rollout of this change, use `oc describe machineconfigpool/worker`.\n\nCheck for any pods which start to crash after this is applied; they may need to be adjusted request `CAP_NET_RAW` explicitly. More information:\nhttps://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-capabilities-for-a-container\nhttps://docs.openshift.com/container-platform/4.5/authentication/managing-security-context-constraints.html", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege" } ] }
rhsa-2020:4280
Vulnerability from csaf_redhat
Published
2020-10-19 15:42
Modified
2025-08-02 13:34
Summary
Red Hat Security Advisory: kernel-rt security update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)\n\n* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4280", "url": "https://access.redhat.com/errata/RHSA-2020:4280" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4280.json" } ], "title": "Red Hat Security Advisory: kernel-rt security update", "tracking": { "current_release_date": "2025-08-02T13:34:58+00:00", "generator": { "date": "2025-08-02T13:34:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:4280", "initial_release_date": "2020-10-19T15:42:52+00:00", "revision_history": [ { "date": "2020-10-19T15:42:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-19T15:42:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T13:34:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.2.2.rt56.1134.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.2.2.rt56.1134.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.2.2.rt56.1134.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.2.2.rt56.1134.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.2.2.rt56.1134.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.2.2.rt56.1134.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.2.2.rt56.1134.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.2.2.rt56.1134.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.2.2.rt56.1134.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.2.2.rt56.1134.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.2.2.rt56.1134.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.2.2.rt56.1134.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.2.2.rt56.1134.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.2.2.rt56.1134.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.2.2.rt56.1134.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.2.2.rt56.1134.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "product": { "name": "kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "product_id": "kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.2.2.rt56.1134.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.2.2.rt56.1134.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12351", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886521" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u2019s Bluetooth implementation handled L2CAP (Logical Link Control and Adaptation Protocol) packets with A2MP (Alternate MAC-PHY Manager Protocol) CID (Channel Identifier). This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: type confusion while processing AMP packets", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 is affected starting with the Red Hat Enterprise Linux 7.4 GA kernel version 3.10.0-693 onward.\n\nFor Red Hat OpenShift Container Platform, while the cluster nodes may be running an underlying kernel that\u0027s affected by this flaw present, both virtual and physical hosts in a production environment will generally have the mitigation already in place of having Bluetooth hardware either not present, or not enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "RHBZ#1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq", "url": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" }, { "category": "external", "summary": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/", "url": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-19T15:42:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4280" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net: bluetooth: type confusion while processing AMP packets" }, { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12352", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886529" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the way Linux kernel\u2019s Bluetooth stack implementation handled initialization of stack memory when handling certain AMP (Alternate MAC-PHY Manager Protocol) packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: information leak when processing certain AMP packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "RHBZ#1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12352", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-19T15:42:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4280" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.2.2.rt56.1134.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.2.2.rt56.1134.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: bluetooth: information leak when processing certain AMP packets" } ] }
rhsa-2020:4279
Vulnerability from csaf_redhat
Published
2020-10-19 17:02
Modified
2025-08-03 23:04
Summary
Red Hat Security Advisory: kernel-alt security update
Notes
Topic
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)
* kernel: information exposure in drivers/char/random.c and kernel/time/timer.c (CVE-2020-16166)
* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)\n\n* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)\n\n* kernel: information exposure in drivers/char/random.c and kernel/time/timer.c (CVE-2020-16166)\n\n* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4279", "url": "https://access.redhat.com/errata/RHSA-2020:4279" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "1865751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865751" }, { "category": "external", "summary": "1877575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877575" }, { "category": "external", "summary": "1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4279.json" } ], "title": "Red Hat Security Advisory: kernel-alt security update", "tracking": { "current_release_date": "2025-08-03T23:04:42+00:00", "generator": { "date": "2025-08-03T23:04:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:4279", "initial_release_date": "2020-10-19T17:02:38+00:00", "revision_history": [ { "date": "2020-10-19T17:02:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-19T17:02:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T23:04:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "kernel-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "kernel-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.14.0-115.32.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.32.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.14.0-115.32.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.14.0-115.32.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.14.0-115.32.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.14.0-115.32.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.32.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "perf-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "perf-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.14.0-115.32.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@4.14.0-115.32.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.32.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.32.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.32.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.32.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.32.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.32.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.32.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.32.1.el7a?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "product": { "name": "kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "product_id": "kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.32.1.el7a?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "product": { "name": "kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "product_id": "kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.14.0-115.32.1.el7a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-alt-0:4.14.0-115.32.1.el7a.src", "product": { "name": "kernel-alt-0:4.14.0-115.32.1.el7a.src", "product_id": "kernel-alt-0:4.14.0-115.32.1.el7a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-alt@4.14.0-115.32.1.el7a?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.14.0-115.32.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src" }, "product_reference": "kernel-alt-0:4.14.0-115.32.1.el7a.src", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.14.0-115.32.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch" }, "product_reference": "kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "perf-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.14.0-115.32.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src" }, "product_reference": "kernel-alt-0:4.14.0-115.32.1.el7a.src", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.14.0-115.32.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch" }, "product_reference": "kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "perf-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12351", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886521" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u2019s Bluetooth implementation handled L2CAP (Logical Link Control and Adaptation Protocol) packets with A2MP (Alternate MAC-PHY Manager Protocol) CID (Channel Identifier). This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: type confusion while processing AMP packets", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 is affected starting with the Red Hat Enterprise Linux 7.4 GA kernel version 3.10.0-693 onward.\n\nFor Red Hat OpenShift Container Platform, while the cluster nodes may be running an underlying kernel that\u0027s affected by this flaw present, both virtual and physical hosts in a production environment will generally have the mitigation already in place of having Bluetooth hardware either not present, or not enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" ], "known_not_affected": [ "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "RHBZ#1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq", "url": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" }, { "category": "external", "summary": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/", "url": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-19T17:02:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4279" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net: bluetooth: type confusion while processing AMP packets" }, { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12352", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886529" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the way Linux kernel\u2019s Bluetooth stack implementation handled initialization of stack memory when handling certain AMP (Alternate MAC-PHY Manager Protocol) packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: information leak when processing certain AMP packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" ], "known_not_affected": [ "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "RHBZ#1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12352", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-19T17:02:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4279" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: bluetooth: information leak when processing certain AMP packets" }, { "cve": "CVE-2020-16166", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-07-31T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1865751" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The generation of the device ID from the network RNG internal state is predictable. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: information exposure in drivers/char/random.c and kernel/time/timer.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" ], "known_not_affected": [ "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "RHBZ#1865751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16166", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16166" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16166", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16166" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-19T17:02:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4279" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: information exposure in drivers/char/random.c and kernel/time/timer.c" }, { "cve": "CVE-2020-25212", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2020-09-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1877575" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NFSv4 implementation where when mounting a remote attacker controlled server it could return specially crafted response allow for local memory corruption and possibly privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TOCTOU mismatch in the NFS client code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" ], "known_not_affected": [ "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "RHBZ#1877575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25212", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25212" } ], "release_date": "2020-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-19T17:02:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4279" }, { "category": "workaround", "details": "While there is no known mitigation to this flaw, configuring authentication and only mounting authenticated NFSv4 servers will significantly reduce the risk of this flaw being successfully exploited.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.32.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.32.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.32.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.32.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: TOCTOU mismatch in the NFS client code" } ] }
opensuse-su-2024:13704-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-longterm-6.6.17-1.1 on GA media
Notes
Title of the patch
kernel-devel-longterm-6.6.17-1.1 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13704
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-devel-longterm-6.6.17-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13704", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13704-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3695 page", "url": "https://www.suse.com/security/cve/CVE-2016-3695/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000251 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000251/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12153 page", "url": "https://www.suse.com/security/cve/CVE-2017-12153/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13080 page", "url": "https://www.suse.com/security/cve/CVE-2017-13080/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14051 page", "url": "https://www.suse.com/security/cve/CVE-2017-14051/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15129 page", "url": "https://www.suse.com/security/cve/CVE-2017-15129/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15265 page", "url": "https://www.suse.com/security/cve/CVE-2017-15265/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16536 page", "url": "https://www.suse.com/security/cve/CVE-2017-16536/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16537 page", "url": "https://www.suse.com/security/cve/CVE-2017-16537/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16645 page", "url": "https://www.suse.com/security/cve/CVE-2017-16645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16646 page", "url": "https://www.suse.com/security/cve/CVE-2017-16646/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16647 page", "url": "https://www.suse.com/security/cve/CVE-2017-16647/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16648 page", "url": "https://www.suse.com/security/cve/CVE-2017-16648/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16995 page", "url": "https://www.suse.com/security/cve/CVE-2017-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16996 page", "url": "https://www.suse.com/security/cve/CVE-2017-16996/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17448 page", "url": "https://www.suse.com/security/cve/CVE-2017-17448/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17449 page", "url": "https://www.suse.com/security/cve/CVE-2017-17449/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17450 page", "url": "https://www.suse.com/security/cve/CVE-2017-17450/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17852 page", "url": "https://www.suse.com/security/cve/CVE-2017-17852/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17853 page", "url": "https://www.suse.com/security/cve/CVE-2017-17853/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17854 page", "url": "https://www.suse.com/security/cve/CVE-2017-17854/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17855 page", "url": "https://www.suse.com/security/cve/CVE-2017-17855/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17856 page", "url": "https://www.suse.com/security/cve/CVE-2017-17856/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17857 page", "url": "https://www.suse.com/security/cve/CVE-2017-17857/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17862 page", "url": "https://www.suse.com/security/cve/CVE-2017-17862/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5123 page", "url": "https://www.suse.com/security/cve/CVE-2017-5123/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5754 page", "url": "https://www.suse.com/security/cve/CVE-2017-5754/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7541 page", "url": "https://www.suse.com/security/cve/CVE-2017-7541/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7542 page", "url": "https://www.suse.com/security/cve/CVE-2017-7542/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8824 page", "url": "https://www.suse.com/security/cve/CVE-2017-8824/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8831 page", "url": "https://www.suse.com/security/cve/CVE-2017-8831/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10322 page", "url": "https://www.suse.com/security/cve/CVE-2018-10322/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10323 page", "url": "https://www.suse.com/security/cve/CVE-2018-10323/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1118 page", "url": "https://www.suse.com/security/cve/CVE-2018-1118/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12232 page", "url": "https://www.suse.com/security/cve/CVE-2018-12232/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12714 page", "url": "https://www.suse.com/security/cve/CVE-2018-12714/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18710 page", "url": "https://www.suse.com/security/cve/CVE-2018-18710/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19824 page", "url": "https://www.suse.com/security/cve/CVE-2018-19824/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5332 page", "url": "https://www.suse.com/security/cve/CVE-2018-5332/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5333 page", "url": "https://www.suse.com/security/cve/CVE-2018-5333/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8043 page", "url": "https://www.suse.com/security/cve/CVE-2018-8043/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8087 page", "url": "https://www.suse.com/security/cve/CVE-2018-8087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10207 page", "url": "https://www.suse.com/security/cve/CVE-2019-10207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11479 page", "url": "https://www.suse.com/security/cve/CVE-2019-11479/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14615 page", "url": "https://www.suse.com/security/cve/CVE-2019-14615/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14814 page", "url": "https://www.suse.com/security/cve/CVE-2019-14814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15030 page", "url": "https://www.suse.com/security/cve/CVE-2019-15030/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15031 page", "url": "https://www.suse.com/security/cve/CVE-2019-15031/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15098 page", "url": "https://www.suse.com/security/cve/CVE-2019-15098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15099 page", "url": "https://www.suse.com/security/cve/CVE-2019-15099/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15290 page", "url": "https://www.suse.com/security/cve/CVE-2019-15290/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15504 page", "url": "https://www.suse.com/security/cve/CVE-2019-15504/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15902 page", "url": "https://www.suse.com/security/cve/CVE-2019-15902/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16231 page", "url": "https://www.suse.com/security/cve/CVE-2019-16231/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18808 page", "url": "https://www.suse.com/security/cve/CVE-2019-18808/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18812 page", "url": "https://www.suse.com/security/cve/CVE-2019-18812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18813 page", "url": "https://www.suse.com/security/cve/CVE-2019-18813/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19252 page", "url": "https://www.suse.com/security/cve/CVE-2019-19252/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19332 page", "url": "https://www.suse.com/security/cve/CVE-2019-19332/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19338 page", "url": "https://www.suse.com/security/cve/CVE-2019-19338/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3016 page", "url": "https://www.suse.com/security/cve/CVE-2019-3016/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3882 page", "url": "https://www.suse.com/security/cve/CVE-2019-3882/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3887 page", "url": "https://www.suse.com/security/cve/CVE-2019-3887/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8564 page", "url": "https://www.suse.com/security/cve/CVE-2019-8564/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9500 page", "url": "https://www.suse.com/security/cve/CVE-2019-9500/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24588 page", "url": "https://www.suse.com/security/cve/CVE-2020-24588/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2732 page", "url": "https://www.suse.com/security/cve/CVE-2020-2732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8648 page", "url": "https://www.suse.com/security/cve/CVE-2020-8648/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26708 page", "url": "https://www.suse.com/security/cve/CVE-2021-26708/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28971 page", "url": "https://www.suse.com/security/cve/CVE-2021-28971/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32606 page", "url": "https://www.suse.com/security/cve/CVE-2021-32606/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33909 page", "url": "https://www.suse.com/security/cve/CVE-2021-33909/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3483 page", "url": "https://www.suse.com/security/cve/CVE-2021-3483/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3489 page", "url": "https://www.suse.com/security/cve/CVE-2021-3489/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3490 page", "url": "https://www.suse.com/security/cve/CVE-2021-3490/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3542 page", "url": "https://www.suse.com/security/cve/CVE-2021-3542/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3640 page", "url": "https://www.suse.com/security/cve/CVE-2021-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3653 page", "url": "https://www.suse.com/security/cve/CVE-2021-3653/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3656 page", "url": "https://www.suse.com/security/cve/CVE-2021-3656/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3744 page", "url": "https://www.suse.com/security/cve/CVE-2021-3744/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3753 page", "url": "https://www.suse.com/security/cve/CVE-2021-3753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37576 page", "url": "https://www.suse.com/security/cve/CVE-2021-37576/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3759 page", "url": "https://www.suse.com/security/cve/CVE-2021-3759/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38166 page", "url": "https://www.suse.com/security/cve/CVE-2021-38166/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43976 page", "url": "https://www.suse.com/security/cve/CVE-2021-43976/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0185 page", "url": "https://www.suse.com/security/cve/CVE-2022-0185/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0330 page", "url": "https://www.suse.com/security/cve/CVE-2022-0330/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0886 page", "url": "https://www.suse.com/security/cve/CVE-2022-0886/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1462 page", "url": "https://www.suse.com/security/cve/CVE-2022-1462/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1516 page", "url": "https://www.suse.com/security/cve/CVE-2022-1516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1729 page", "url": "https://www.suse.com/security/cve/CVE-2022-1729/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1852 page", "url": "https://www.suse.com/security/cve/CVE-2022-1852/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1966 page", "url": "https://www.suse.com/security/cve/CVE-2022-1966/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1972 page", "url": "https://www.suse.com/security/cve/CVE-2022-1972/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1973 page", "url": "https://www.suse.com/security/cve/CVE-2022-1973/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-22942 page", "url": "https://www.suse.com/security/cve/CVE-2022-22942/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2308 page", "url": "https://www.suse.com/security/cve/CVE-2022-2308/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24958 page", "url": "https://www.suse.com/security/cve/CVE-2022-24958/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2588 page", "url": "https://www.suse.com/security/cve/CVE-2022-2588/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2590 page", "url": "https://www.suse.com/security/cve/CVE-2022-2590/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26490 page", "url": "https://www.suse.com/security/cve/CVE-2022-26490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28388 page", "url": "https://www.suse.com/security/cve/CVE-2022-28388/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28389 page", "url": "https://www.suse.com/security/cve/CVE-2022-28389/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28390 page", "url": "https://www.suse.com/security/cve/CVE-2022-28390/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28893 page", "url": "https://www.suse.com/security/cve/CVE-2022-28893/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29900 page", "url": "https://www.suse.com/security/cve/CVE-2022-29900/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29901 page", "url": "https://www.suse.com/security/cve/CVE-2022-29901/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29968 page", "url": "https://www.suse.com/security/cve/CVE-2022-29968/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3424 page", "url": "https://www.suse.com/security/cve/CVE-2022-3424/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3628 page", "url": "https://www.suse.com/security/cve/CVE-2022-3628/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3640 page", "url": "https://www.suse.com/security/cve/CVE-2022-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-40982 page", "url": "https://www.suse.com/security/cve/CVE-2022-40982/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41218 page", "url": "https://www.suse.com/security/cve/CVE-2022-41218/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41674 page", "url": "https://www.suse.com/security/cve/CVE-2022-41674/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42719 page", "url": "https://www.suse.com/security/cve/CVE-2022-42719/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42720 page", "url": "https://www.suse.com/security/cve/CVE-2022-42720/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42721 page", "url": "https://www.suse.com/security/cve/CVE-2022-42721/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42722 page", "url": "https://www.suse.com/security/cve/CVE-2022-42722/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4379 page", "url": "https://www.suse.com/security/cve/CVE-2022-4379/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44032 page", "url": "https://www.suse.com/security/cve/CVE-2022-44032/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44033 page", "url": "https://www.suse.com/security/cve/CVE-2022-44033/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44034 page", "url": "https://www.suse.com/security/cve/CVE-2022-44034/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45884 page", "url": "https://www.suse.com/security/cve/CVE-2022-45884/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45885 page", "url": "https://www.suse.com/security/cve/CVE-2022-45885/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45886 page", "url": "https://www.suse.com/security/cve/CVE-2022-45886/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45887 page", "url": "https://www.suse.com/security/cve/CVE-2022-45887/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45888 page", "url": "https://www.suse.com/security/cve/CVE-2022-45888/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45919 page", "url": "https://www.suse.com/security/cve/CVE-2022-45919/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45934 page", "url": "https://www.suse.com/security/cve/CVE-2022-45934/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0045 page", "url": "https://www.suse.com/security/cve/CVE-2023-0045/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1076 page", "url": "https://www.suse.com/security/cve/CVE-2023-1076/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1078 page", "url": "https://www.suse.com/security/cve/CVE-2023-1078/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1192 page", "url": "https://www.suse.com/security/cve/CVE-2023-1192/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1380 page", "url": "https://www.suse.com/security/cve/CVE-2023-1380/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20569 page", "url": "https://www.suse.com/security/cve/CVE-2023-20569/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20593 page", "url": "https://www.suse.com/security/cve/CVE-2023-20593/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2124 page", "url": "https://www.suse.com/security/cve/CVE-2023-2124/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31084 page", "url": "https://www.suse.com/security/cve/CVE-2023-31084/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3141 page", "url": "https://www.suse.com/security/cve/CVE-2023-3141/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3269 page", "url": "https://www.suse.com/security/cve/CVE-2023-3269/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-39192 page", "url": "https://www.suse.com/security/cve/CVE-2023-39192/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-39193 page", "url": "https://www.suse.com/security/cve/CVE-2023-39193/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4128 page", "url": "https://www.suse.com/security/cve/CVE-2023-4128/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4134 page", "url": "https://www.suse.com/security/cve/CVE-2023-4134/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4194 page", "url": "https://www.suse.com/security/cve/CVE-2023-4194/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42753 page", "url": "https://www.suse.com/security/cve/CVE-2023-42753/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42754 page", "url": "https://www.suse.com/security/cve/CVE-2023-42754/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42756 page", "url": "https://www.suse.com/security/cve/CVE-2023-42756/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4623 page", "url": "https://www.suse.com/security/cve/CVE-2023-4623/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46813 page", "url": "https://www.suse.com/security/cve/CVE-2023-46813/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4881 page", "url": "https://www.suse.com/security/cve/CVE-2023-4881/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-5345 page", "url": "https://www.suse.com/security/cve/CVE-2023-5345/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6606 page", "url": "https://www.suse.com/security/cve/CVE-2023-6606/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6610 page", "url": "https://www.suse.com/security/cve/CVE-2023-6610/" } ], "title": "kernel-devel-longterm-6.6.17-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13704-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.aarch64", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.aarch64", "product_id": "kernel-devel-longterm-6.6.17-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.aarch64", "product": { "name": "kernel-source-longterm-6.6.17-1.1.aarch64", "product_id": "kernel-source-longterm-6.6.17-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "product_id": "kernel-devel-longterm-6.6.17-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.ppc64le", "product": { "name": "kernel-source-longterm-6.6.17-1.1.ppc64le", "product_id": "kernel-source-longterm-6.6.17-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.s390x", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.s390x", "product_id": "kernel-devel-longterm-6.6.17-1.1.s390x" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.s390x", "product": { "name": "kernel-source-longterm-6.6.17-1.1.s390x", "product_id": "kernel-source-longterm-6.6.17-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.x86_64", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.x86_64", "product_id": "kernel-devel-longterm-6.6.17-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.x86_64", "product": { "name": "kernel-source-longterm-6.6.17-1.1.x86_64", "product_id": "kernel-source-longterm-6.6.17-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3695", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3695" } ], "notes": [ { "category": "general", "text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3695", "url": "https://www.suse.com/security/cve/CVE-2016-3695" }, { "category": "external", "summary": "SUSE Bug 1023051 for CVE-2016-3695", "url": "https://bugzilla.suse.com/1023051" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3695" }, { "cve": "CVE-2017-1000251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000251" } ], "notes": [ { "category": "general", "text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000251", "url": "https://www.suse.com/security/cve/CVE-2017-1000251" }, { "category": "external", "summary": "SUSE Bug 1057389 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057389" }, { "category": "external", "summary": "SUSE Bug 1057950 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057950" }, { "category": "external", "summary": "SUSE Bug 1070535 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1070535" }, { "category": "external", "summary": "SUSE Bug 1072117 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072117" }, { "category": "external", "summary": "SUSE Bug 1072162 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072162" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-1000251" }, { "cve": "CVE-2017-12153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12153" } ], "notes": [ { "category": "general", "text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12153", "url": "https://www.suse.com/security/cve/CVE-2017-12153" }, { "category": "external", "summary": "SUSE Bug 1058410 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058410" }, { "category": "external", "summary": "SUSE Bug 1058624 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-12153" }, { "cve": "CVE-2017-13080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13080" } ], "notes": [ { "category": "general", "text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13080", "url": "https://www.suse.com/security/cve/CVE-2017-13080" }, { "category": "external", "summary": "SUSE Bug 1056061 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1056061" }, { "category": "external", "summary": "SUSE Bug 1063479 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063479" }, { "category": "external", "summary": "SUSE Bug 1063667 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063667" }, { "category": "external", "summary": "SUSE Bug 1063671 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063671" }, { "category": "external", "summary": "SUSE Bug 1066295 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1066295" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1178872 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1178872" }, { "category": "external", "summary": "SUSE Bug 1179588 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1179588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-13080" }, { "cve": "CVE-2017-14051", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14051" } ], "notes": [ { "category": "general", "text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14051", "url": "https://www.suse.com/security/cve/CVE-2017-14051" }, { "category": "external", "summary": "SUSE Bug 1056588 for CVE-2017-14051", "url": "https://bugzilla.suse.com/1056588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-14051" }, { "cve": "CVE-2017-15129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15129" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15129", "url": "https://www.suse.com/security/cve/CVE-2017-15129" }, { "category": "external", "summary": "SUSE Bug 1074839 for CVE-2017-15129", "url": "https://bugzilla.suse.com/1074839" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15129" }, { "cve": "CVE-2017-15265", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15265" } ], "notes": [ { "category": "general", "text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15265", "url": "https://www.suse.com/security/cve/CVE-2017-15265" }, { "category": "external", "summary": "SUSE Bug 1062520 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1062520" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-15265" }, { "cve": "CVE-2017-16536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16536" } ], "notes": [ { "category": "general", "text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16536", "url": "https://www.suse.com/security/cve/CVE-2017-16536" }, { "category": "external", "summary": "SUSE Bug 1066606 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1066606" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16536" }, { "cve": "CVE-2017-16537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16537" } ], "notes": [ { "category": "general", "text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16537", "url": "https://www.suse.com/security/cve/CVE-2017-16537" }, { "category": "external", "summary": "SUSE Bug 1066573 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1066573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16537" }, { "cve": "CVE-2017-16645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16645" } ], "notes": [ { "category": "general", "text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16645", "url": "https://www.suse.com/security/cve/CVE-2017-16645" }, { "category": "external", "summary": "SUSE Bug 1067132 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1067132" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16645" }, { "cve": "CVE-2017-16646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16646" } ], "notes": [ { "category": "general", "text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16646", "url": "https://www.suse.com/security/cve/CVE-2017-16646" }, { "category": "external", "summary": "SUSE Bug 1067105 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1067105" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16646" }, { "cve": "CVE-2017-16647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16647" } ], "notes": [ { "category": "general", "text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16647", "url": "https://www.suse.com/security/cve/CVE-2017-16647" }, { "category": "external", "summary": "SUSE Bug 1067102 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1067102" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16647" }, { "cve": "CVE-2017-16648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16648" } ], "notes": [ { "category": "general", "text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16648", "url": "https://www.suse.com/security/cve/CVE-2017-16648" }, { "category": "external", "summary": "SUSE Bug 1067087 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1067087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16648" }, { "cve": "CVE-2017-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16995" } ], "notes": [ { "category": "general", "text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16995", "url": "https://www.suse.com/security/cve/CVE-2017-16995" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16995", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16995" }, { "cve": "CVE-2017-16996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16996" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16996", "url": "https://www.suse.com/security/cve/CVE-2017-16996" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16996", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16996" }, { "cve": "CVE-2017-17448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17448" } ], "notes": [ { "category": "general", "text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17448", "url": "https://www.suse.com/security/cve/CVE-2017-17448" }, { "category": "external", "summary": "SUSE Bug 1071693 for CVE-2017-17448", "url": "https://bugzilla.suse.com/1071693" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17448" }, { "cve": "CVE-2017-17449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17449" } ], "notes": [ { "category": "general", "text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17449", "url": "https://www.suse.com/security/cve/CVE-2017-17449" }, { "category": "external", "summary": "SUSE Bug 1071694 for CVE-2017-17449", "url": "https://bugzilla.suse.com/1071694" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17449" }, { "cve": "CVE-2017-17450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17450" } ], "notes": [ { "category": "general", "text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17450", "url": "https://www.suse.com/security/cve/CVE-2017-17450" }, { "category": "external", "summary": "SUSE Bug 1071695 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1071695" }, { "category": "external", "summary": "SUSE Bug 1074033 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1074033" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17450" }, { "cve": "CVE-2017-17852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17852" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17852", "url": "https://www.suse.com/security/cve/CVE-2017-17852" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17852", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17852" }, { "cve": "CVE-2017-17853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17853" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17853", "url": "https://www.suse.com/security/cve/CVE-2017-17853" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17853", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17853" }, { "cve": "CVE-2017-17854", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17854" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17854", "url": "https://www.suse.com/security/cve/CVE-2017-17854" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17854", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17854" }, { "cve": "CVE-2017-17855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17855" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17855", "url": "https://www.suse.com/security/cve/CVE-2017-17855" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17855", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17855" }, { "cve": "CVE-2017-17856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17856" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17856", "url": "https://www.suse.com/security/cve/CVE-2017-17856" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17856", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17856" }, { "cve": "CVE-2017-17857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17857" } ], "notes": [ { "category": "general", "text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17857", "url": "https://www.suse.com/security/cve/CVE-2017-17857" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17857", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17857" }, { "cve": "CVE-2017-17862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17862" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17862", "url": "https://www.suse.com/security/cve/CVE-2017-17862" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17862", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17862" }, { "cve": "CVE-2017-5123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5123" } ], "notes": [ { "category": "general", "text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5123", "url": "https://www.suse.com/security/cve/CVE-2017-5123" }, { "category": "external", "summary": "SUSE Bug 1062473 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1062473" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5123" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2017-5754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5754" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5754", "url": "https://www.suse.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075008 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075008" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1115045" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-5754" }, { "cve": "CVE-2017-7541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7541" } ], "notes": [ { "category": "general", "text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7541", "url": "https://www.suse.com/security/cve/CVE-2017-7541" }, { "category": "external", "summary": "SUSE Bug 1049645 for CVE-2017-7541", "url": "https://bugzilla.suse.com/1049645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7541" }, { "cve": "CVE-2017-7542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7542" } ], "notes": [ { "category": "general", "text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7542", "url": "https://www.suse.com/security/cve/CVE-2017-7542" }, { "category": "external", "summary": "SUSE Bug 1049882 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1049882" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1061936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7542" }, { "cve": "CVE-2017-8824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8824" } ], "notes": [ { "category": "general", "text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8824", "url": "https://www.suse.com/security/cve/CVE-2017-8824" }, { "category": "external", "summary": "SUSE Bug 1070771 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1070771" }, { "category": "external", "summary": "SUSE Bug 1076734 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1076734" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1092904" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-8824" }, { "cve": "CVE-2017-8831", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8831" } ], "notes": [ { "category": "general", "text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8831", "url": "https://www.suse.com/security/cve/CVE-2017-8831" }, { "category": "external", "summary": "SUSE Bug 1037994 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1037994" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1061936" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-8831" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-10322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10322" } ], "notes": [ { "category": "general", "text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10322", "url": "https://www.suse.com/security/cve/CVE-2018-10322" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090749 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1090749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10322" }, { "cve": "CVE-2018-10323", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10323" } ], "notes": [ { "category": "general", "text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10323", "url": "https://www.suse.com/security/cve/CVE-2018-10323" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090717 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1090717" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10323" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1118" } ], "notes": [ { "category": "general", "text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1118", "url": "https://www.suse.com/security/cve/CVE-2018-1118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092472 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1092472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1118" }, { "cve": "CVE-2018-12232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12232" } ], "notes": [ { "category": "general", "text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12232", "url": "https://www.suse.com/security/cve/CVE-2018-12232" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097593 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1097593" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1127757 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1127757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12232" }, { "cve": "CVE-2018-12714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12714" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12714", "url": "https://www.suse.com/security/cve/CVE-2018-12714" }, { "category": "external", "summary": "SUSE Bug 1098933 for CVE-2018-12714", "url": "https://bugzilla.suse.com/1098933" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12714" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-18710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18710" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18710", "url": "https://www.suse.com/security/cve/CVE-2018-18710" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-18710", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-18710" }, { "cve": "CVE-2018-19824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19824" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19824", "url": "https://www.suse.com/security/cve/CVE-2018-19824" }, { "category": "external", "summary": "SUSE Bug 1118152 for CVE-2018-19824", "url": "https://bugzilla.suse.com/1118152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19824" }, { "cve": "CVE-2018-5332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5332" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5332", "url": "https://www.suse.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "SUSE Bug 1075621 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1075621" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5333" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5333", "url": "https://www.suse.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "SUSE Bug 1075617 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1075617" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5333" }, { "cve": "CVE-2018-8043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8043" } ], "notes": [ { "category": "general", "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8043", "url": "https://www.suse.com/security/cve/CVE-2018-8043" }, { "category": "external", "summary": "SUSE Bug 1084829 for CVE-2018-8043", "url": "https://bugzilla.suse.com/1084829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-8043" }, { "cve": "CVE-2018-8087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8087" } ], "notes": [ { "category": "general", "text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8087", "url": "https://www.suse.com/security/cve/CVE-2018-8087" }, { "category": "external", "summary": "SUSE Bug 1085053 for CVE-2018-8087", "url": "https://bugzilla.suse.com/1085053" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8087" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2019-10207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10207" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10207", "url": "https://www.suse.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "SUSE Bug 1123959 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1123959" }, { "category": "external", "summary": "SUSE Bug 1142857 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1142857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-10207" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11479", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11479" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11479", "url": "https://www.suse.com/security/cve/CVE-2019-11479" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11479" }, { "cve": "CVE-2019-14615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14615" } ], "notes": [ { "category": "general", "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14615", "url": "https://www.suse.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "SUSE Bug 1160195 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1160195" }, { "category": "external", "summary": "SUSE Bug 1165881 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1165881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14615" }, { "cve": "CVE-2019-14814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14814" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14814", "url": "https://www.suse.com/security/cve/CVE-2019-14814" }, { "category": "external", "summary": "SUSE Bug 1146512 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1146512" }, { "category": "external", "summary": "SUSE Bug 1173664 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173664" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14814" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-15030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15030" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15030", "url": "https://www.suse.com/security/cve/CVE-2019-15030" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15030", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15030" }, { "cve": "CVE-2019-15031", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15031" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15031", "url": "https://www.suse.com/security/cve/CVE-2019-15031" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15031", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15031" }, { "cve": "CVE-2019-15098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15098" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15098", "url": "https://www.suse.com/security/cve/CVE-2019-15098" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146543" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15098" }, { "cve": "CVE-2019-15099", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15099" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15099", "url": "https://www.suse.com/security/cve/CVE-2019-15099" }, { "category": "external", "summary": "SUSE Bug 1146368 for CVE-2019-15099", "url": "https://bugzilla.suse.com/1146368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15099" }, { "cve": "CVE-2019-15290", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15290" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15290", "url": "https://www.suse.com/security/cve/CVE-2019-15290" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146543" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15290" }, { "cve": "CVE-2019-15504", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15504" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15504", "url": "https://www.suse.com/security/cve/CVE-2019-15504" }, { "category": "external", "summary": "SUSE Bug 1147116 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1147116" }, { "category": "external", "summary": "SUSE Bug 1185852 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1185852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-15504" }, { "cve": "CVE-2019-15902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15902" } ], "notes": [ { "category": "general", "text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15902", "url": "https://www.suse.com/security/cve/CVE-2019-15902" }, { "category": "external", "summary": "SUSE Bug 1149376 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1149376" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15902" }, { "cve": "CVE-2019-16231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16231" } ], "notes": [ { "category": "general", "text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16231", "url": "https://www.suse.com/security/cve/CVE-2019-16231" }, { "category": "external", "summary": "SUSE Bug 1150466 for CVE-2019-16231", "url": "https://bugzilla.suse.com/1150466" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-16231" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17666" }, { "cve": "CVE-2019-18808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18808" } ], "notes": [ { "category": "general", "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18808", "url": "https://www.suse.com/security/cve/CVE-2019-18808" }, { "category": "external", "summary": "SUSE Bug 1156259 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1156259" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18808" }, { "cve": "CVE-2019-18812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18812" } ], "notes": [ { "category": "general", "text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18812", "url": "https://www.suse.com/security/cve/CVE-2019-18812" }, { "category": "external", "summary": "SUSE Bug 1156277 for CVE-2019-18812", "url": "https://bugzilla.suse.com/1156277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18812" }, { "cve": "CVE-2019-18813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18813" } ], "notes": [ { "category": "general", "text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18813", "url": "https://www.suse.com/security/cve/CVE-2019-18813" }, { "category": "external", "summary": "SUSE Bug 1156278 for CVE-2019-18813", "url": "https://bugzilla.suse.com/1156278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18813" }, { "cve": "CVE-2019-19252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19252" } ], "notes": [ { "category": "general", "text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19252", "url": "https://www.suse.com/security/cve/CVE-2019-19252" }, { "category": "external", "summary": "SUSE Bug 1157813 for CVE-2019-19252", "url": "https://bugzilla.suse.com/1157813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19252" }, { "cve": "CVE-2019-19332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19332" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19332", "url": "https://www.suse.com/security/cve/CVE-2019-19332" }, { "category": "external", "summary": "SUSE Bug 1158827 for CVE-2019-19332", "url": "https://bugzilla.suse.com/1158827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19332" }, { "cve": "CVE-2019-19338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19338" } ], "notes": [ { "category": "general", "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19338", "url": "https://www.suse.com/security/cve/CVE-2019-19338" }, { "category": "external", "summary": "SUSE Bug 1158954 for CVE-2019-19338", "url": "https://bugzilla.suse.com/1158954" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19338" }, { "cve": "CVE-2019-3016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3016" } ], "notes": [ { "category": "general", "text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3016", "url": "https://www.suse.com/security/cve/CVE-2019-3016" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1161154 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1161154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3016" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3846" }, { "cve": "CVE-2019-3882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3882", "url": "https://www.suse.com/security/cve/CVE-2019-3882" }, { "category": "external", "summary": "SUSE Bug 1131416 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131416" }, { "category": "external", "summary": "SUSE Bug 1131427 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131427" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3882" }, { "cve": "CVE-2019-3887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3887" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3887", "url": "https://www.suse.com/security/cve/CVE-2019-3887" }, { "category": "external", "summary": "SUSE Bug 1131800 for CVE-2019-3887", "url": "https://bugzilla.suse.com/1131800" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3887" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-8564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8564" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8564", "url": "https://www.suse.com/security/cve/CVE-2019-8564" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8564" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-9500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9500" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9500", "url": "https://www.suse.com/security/cve/CVE-2019-9500" }, { "category": "external", "summary": "SUSE Bug 1132681 for CVE-2019-9500", "url": "https://bugzilla.suse.com/1132681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-9500" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-24588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24588" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24588", "url": "https://www.suse.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "SUSE Bug 1185861 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1185861" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1192868" }, { "category": "external", "summary": "SUSE Bug 1199701 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1199701" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24588" }, { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-2732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2732" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2732", "url": "https://www.suse.com/security/cve/CVE-2020-2732" }, { "category": "external", "summary": "SUSE Bug 1163971 for CVE-2020-2732", "url": "https://bugzilla.suse.com/1163971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2732" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-8648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8648" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8648", "url": "https://www.suse.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "SUSE Bug 1162928 for CVE-2020-8648", "url": "https://bugzilla.suse.com/1162928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8694" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-26708", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26708" } ], "notes": [ { "category": "general", "text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26708", "url": "https://www.suse.com/security/cve/CVE-2021-26708" }, { "category": "external", "summary": "SUSE Bug 1181806 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1181806" }, { "category": "external", "summary": "SUSE Bug 1183298 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1183298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-26708" }, { "cve": "CVE-2021-28971", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28971" } ], "notes": [ { "category": "general", "text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28971", "url": "https://www.suse.com/security/cve/CVE-2021-28971" }, { "category": "external", "summary": "SUSE Bug 1184196 for CVE-2021-28971", "url": "https://bugzilla.suse.com/1184196" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-28971" }, { "cve": "CVE-2021-32606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32606" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32606", "url": "https://www.suse.com/security/cve/CVE-2021-32606" }, { "category": "external", "summary": "SUSE Bug 1185953 for CVE-2021-32606", "url": "https://bugzilla.suse.com/1185953" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-32606" }, { "cve": "CVE-2021-33909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33909" } ], "notes": [ { "category": "general", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33909", "url": "https://www.suse.com/security/cve/CVE-2021-33909" }, { "category": "external", "summary": "SUSE Bug 1188062 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188062" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188063" }, { "category": "external", "summary": "SUSE Bug 1188257 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188257" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1189302" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-33909" }, { "cve": "CVE-2021-3483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3483" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3483", "url": "https://www.suse.com/security/cve/CVE-2021-3483" }, { "category": "external", "summary": "SUSE Bug 1184393 for CVE-2021-3483", "url": "https://bugzilla.suse.com/1184393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3483" }, { "cve": "CVE-2021-3489", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3489" } ], "notes": [ { "category": "general", "text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3489", "url": "https://www.suse.com/security/cve/CVE-2021-3489" }, { "category": "external", "summary": "SUSE Bug 1185640 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185640" }, { "category": "external", "summary": "SUSE Bug 1185856 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3489" }, { "cve": "CVE-2021-3490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3490" } ], "notes": [ { "category": "general", "text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3490", "url": "https://www.suse.com/security/cve/CVE-2021-3490" }, { "category": "external", "summary": "SUSE Bug 1185641 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185641" }, { "category": "external", "summary": "SUSE Bug 1185796 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185796" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3490" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3491" }, { "cve": "CVE-2021-3542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3542" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3542", "url": "https://www.suse.com/security/cve/CVE-2021-3542" }, { "category": "external", "summary": "SUSE Bug 1184673 for CVE-2021-3542", "url": "https://bugzilla.suse.com/1184673" }, { "category": "external", "summary": "SUSE Bug 1186063 for CVE-2021-3542", "url": "https://bugzilla.suse.com/1186063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3542" }, { "cve": "CVE-2021-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3640" } ], "notes": [ { "category": "general", "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3640", "url": "https://www.suse.com/security/cve/CVE-2021-3640" }, { "category": "external", "summary": "SUSE Bug 1188172 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188172" }, { "category": "external", "summary": "SUSE Bug 1188613 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188613" }, { "category": "external", "summary": "SUSE Bug 1191530 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1191530" }, { "category": "external", "summary": "SUSE Bug 1196810 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196810" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3640" }, { "cve": "CVE-2021-3653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3653" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3653", "url": "https://www.suse.com/security/cve/CVE-2021-3653" }, { "category": "external", "summary": "SUSE Bug 1189399 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189399" }, { "category": "external", "summary": "SUSE Bug 1189420 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189420" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3653" }, { "cve": "CVE-2021-3656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3656", "url": "https://www.suse.com/security/cve/CVE-2021-3656" }, { "category": "external", "summary": "SUSE Bug 1189400 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189400" }, { "category": "external", "summary": "SUSE Bug 1189418 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3656" }, { "cve": "CVE-2021-3744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3744" } ], "notes": [ { "category": "general", "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3744", "url": "https://www.suse.com/security/cve/CVE-2021-3744" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3744" }, { "cve": "CVE-2021-3753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3753" } ], "notes": [ { "category": "general", "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3753", "url": "https://www.suse.com/security/cve/CVE-2021-3753" }, { "category": "external", "summary": "SUSE Bug 1190025 for CVE-2021-3753", "url": "https://bugzilla.suse.com/1190025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3753" }, { "cve": "CVE-2021-37576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-37576" } ], "notes": [ { "category": "general", "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-37576", "url": "https://www.suse.com/security/cve/CVE-2021-37576" }, { "category": "external", "summary": "SUSE Bug 1188838 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188838" }, { "category": "external", "summary": "SUSE Bug 1188842 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188842" }, { "category": "external", "summary": "SUSE Bug 1190276 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1190276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-37576" }, { "cve": "CVE-2021-3759", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3759" } ], "notes": [ { "category": "general", "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3759", "url": "https://www.suse.com/security/cve/CVE-2021-3759" }, { "category": "external", "summary": "SUSE Bug 1190115 for CVE-2021-3759", "url": "https://bugzilla.suse.com/1190115" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3759" }, { "cve": "CVE-2021-38166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-38166" } ], "notes": [ { "category": "general", "text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-38166", "url": "https://www.suse.com/security/cve/CVE-2021-38166" }, { "category": "external", "summary": "SUSE Bug 1189233 for CVE-2021-38166", "url": "https://bugzilla.suse.com/1189233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-38166" }, { "cve": "CVE-2021-43976", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43976" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43976", "url": "https://www.suse.com/security/cve/CVE-2021-43976" }, { "category": "external", "summary": "SUSE Bug 1192847 for CVE-2021-43976", "url": "https://bugzilla.suse.com/1192847" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-43976" }, { "cve": "CVE-2022-0185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0185" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0185", "url": "https://www.suse.com/security/cve/CVE-2022-0185" }, { "category": "external", "summary": "SUSE Bug 1194517 for CVE-2022-0185", "url": "https://bugzilla.suse.com/1194517" }, { "category": "external", "summary": "SUSE Bug 1194737 for CVE-2022-0185", "url": "https://bugzilla.suse.com/1194737" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0185" }, { "cve": "CVE-2022-0330", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0330" } ], "notes": [ { "category": "general", "text": "A random memory access flaw was found in the Linux kernel\u0027s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0330", "url": "https://www.suse.com/security/cve/CVE-2022-0330" }, { "category": "external", "summary": "SUSE Bug 1194880 for CVE-2022-0330", "url": "https://bugzilla.suse.com/1194880" }, { "category": "external", "summary": "SUSE Bug 1195950 for CVE-2022-0330", "url": "https://bugzilla.suse.com/1195950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0330" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-0886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0886" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27666. Reason: This candidate is a reservation duplicate of CVE-2022-27666. Notes: All CVE users should reference CVE-2022-27666 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0886", "url": "https://www.suse.com/security/cve/CVE-2022-0886" }, { "category": "external", "summary": "SUSE Bug 1197131 for CVE-2022-0886", "url": "https://bugzilla.suse.com/1197131" }, { "category": "external", "summary": "SUSE Bug 1197133 for CVE-2022-0886", "url": "https://bugzilla.suse.com/1197133" }, { "category": "external", "summary": "SUSE Bug 1197462 for CVE-2022-0886", "url": "https://bugzilla.suse.com/1197462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0886" }, { "cve": "CVE-2022-1462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1462" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1462", "url": "https://www.suse.com/security/cve/CVE-2022-1462" }, { "category": "external", "summary": "SUSE Bug 1198829 for CVE-2022-1462", "url": "https://bugzilla.suse.com/1198829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1516" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1516", "url": "https://www.suse.com/security/cve/CVE-2022-1516" }, { "category": "external", "summary": "SUSE Bug 1199012 for CVE-2022-1516", "url": "https://bugzilla.suse.com/1199012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1516" }, { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1729" } ], "notes": [ { "category": "general", "text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1729", "url": "https://www.suse.com/security/cve/CVE-2022-1729" }, { "category": "external", "summary": "SUSE Bug 1199507 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199507" }, { "category": "external", "summary": "SUSE Bug 1199697 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199697" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1201832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1852" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1852", "url": "https://www.suse.com/security/cve/CVE-2022-1852" }, { "category": "external", "summary": "SUSE Bug 1199875 for CVE-2022-1852", "url": "https://bugzilla.suse.com/1199875" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1852" }, { "cve": "CVE-2022-1966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1966" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1966", "url": "https://www.suse.com/security/cve/CVE-2022-1966" }, { "category": "external", "summary": "SUSE Bug 1200015 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200015" }, { "category": "external", "summary": "SUSE Bug 1200268 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200268" }, { "category": "external", "summary": "SUSE Bug 1200494 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200494" }, { "category": "external", "summary": "SUSE Bug 1200529 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200529" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1966" }, { "cve": "CVE-2022-1972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1972" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1972", "url": "https://www.suse.com/security/cve/CVE-2022-1972" }, { "category": "external", "summary": "SUSE Bug 1200019 for CVE-2022-1972", "url": "https://bugzilla.suse.com/1200019" }, { "category": "external", "summary": "SUSE Bug 1200266 for CVE-2022-1972", "url": "https://bugzilla.suse.com/1200266" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1972" }, { "cve": "CVE-2022-1973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1973" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1973", "url": "https://www.suse.com/security/cve/CVE-2022-1973" }, { "category": "external", "summary": "SUSE Bug 1200023 for CVE-2022-1973", "url": "https://bugzilla.suse.com/1200023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1973" }, { "cve": "CVE-2022-22942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-22942" } ], "notes": [ { "category": "general", "text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-22942", "url": "https://www.suse.com/security/cve/CVE-2022-22942" }, { "category": "external", "summary": "SUSE Bug 1195065 for CVE-2022-22942", "url": "https://bugzilla.suse.com/1195065" }, { "category": "external", "summary": "SUSE Bug 1195951 for CVE-2022-22942", "url": "https://bugzilla.suse.com/1195951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-22942" }, { "cve": "CVE-2022-2308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2308" } ], "notes": [ { "category": "general", "text": "A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2308", "url": "https://www.suse.com/security/cve/CVE-2022-2308" }, { "category": "external", "summary": "SUSE Bug 1202573 for CVE-2022-2308", "url": "https://bugzilla.suse.com/1202573" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-2308" }, { "cve": "CVE-2022-24958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24958" } ], "notes": [ { "category": "general", "text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24958", "url": "https://www.suse.com/security/cve/CVE-2022-24958" }, { "category": "external", "summary": "SUSE Bug 1195905 for CVE-2022-24958", "url": "https://bugzilla.suse.com/1195905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-24958" }, { "cve": "CVE-2022-2588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2588" } ], "notes": [ { "category": "general", "text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2588", "url": "https://www.suse.com/security/cve/CVE-2022-2588" }, { "category": "external", "summary": "SUSE Bug 1202096 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1202096" }, { "category": "external", "summary": "SUSE Bug 1203613 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1203613" }, { "category": "external", "summary": "SUSE Bug 1204183 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1204183" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2590" } ], "notes": [ { "category": "general", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2590", "url": "https://www.suse.com/security/cve/CVE-2022-2590" }, { "category": "external", "summary": "SUSE Bug 1202013 for CVE-2022-2590", "url": "https://bugzilla.suse.com/1202013" }, { "category": "external", "summary": "SUSE Bug 1202089 for CVE-2022-2590", "url": "https://bugzilla.suse.com/1202089" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-2590" }, { "cve": "CVE-2022-26490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26490" } ], "notes": [ { "category": "general", "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26490", "url": "https://www.suse.com/security/cve/CVE-2022-26490" }, { "category": "external", "summary": "SUSE Bug 1196830 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1196830" }, { "category": "external", "summary": "SUSE Bug 1201656 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201656" }, { "category": "external", "summary": "SUSE Bug 1201969 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201969" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-26490" }, { "cve": "CVE-2022-28388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28388" } ], "notes": [ { "category": "general", "text": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28388", "url": "https://www.suse.com/security/cve/CVE-2022-28388" }, { "category": "external", "summary": "SUSE Bug 1198032 for CVE-2022-28388", "url": "https://bugzilla.suse.com/1198032" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-28388" }, { "cve": "CVE-2022-28389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28389" } ], "notes": [ { "category": "general", "text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28389", "url": "https://www.suse.com/security/cve/CVE-2022-28389" }, { "category": "external", "summary": "SUSE Bug 1198033 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1198033" }, { "category": "external", "summary": "SUSE Bug 1201657 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1201657" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-28389" }, { "cve": "CVE-2022-28390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28390" } ], "notes": [ { "category": "general", "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28390", "url": "https://www.suse.com/security/cve/CVE-2022-28390" }, { "category": "external", "summary": "SUSE Bug 1198031 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1198031" }, { "category": "external", "summary": "SUSE Bug 1201517 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1201517" }, { "category": "external", "summary": "SUSE Bug 1207969 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1207969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-28390" }, { "cve": "CVE-2022-28893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28893" } ], "notes": [ { "category": "general", "text": "The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28893", "url": "https://www.suse.com/security/cve/CVE-2022-28893" }, { "category": "external", "summary": "SUSE Bug 1198330 for CVE-2022-28893", "url": "https://bugzilla.suse.com/1198330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-28893" }, { "cve": "CVE-2022-29900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29900" } ], "notes": [ { "category": "general", "text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29900", "url": "https://www.suse.com/security/cve/CVE-2022-29900" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29901" } ], "notes": [ { "category": "general", "text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29901", "url": "https://www.suse.com/security/cve/CVE-2022-29901" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-29901" }, { "cve": "CVE-2022-29968", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29968" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb-\u003eprivate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29968", "url": "https://www.suse.com/security/cve/CVE-2022-29968" }, { "category": "external", "summary": "SUSE Bug 1199087 for CVE-2022-29968", "url": "https://bugzilla.suse.com/1199087" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2022-29968" }, { "cve": "CVE-2022-3424", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3424" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3424", "url": "https://www.suse.com/security/cve/CVE-2022-3424" }, { "category": "external", "summary": "SUSE Bug 1204166 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1204166" }, { "category": "external", "summary": "SUSE Bug 1204167 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1204167" }, { "category": "external", "summary": "SUSE Bug 1208044 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1208044" }, { "category": "external", "summary": "SUSE Bug 1212309 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1212309" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34918" }, { "cve": "CVE-2022-3628", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3628" } ], "notes": [ { "category": "general", "text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3628", "url": "https://www.suse.com/security/cve/CVE-2022-3628" }, { "category": "external", "summary": "SUSE Bug 1204868 for CVE-2022-3628", "url": "https://bugzilla.suse.com/1204868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-3628" }, { "cve": "CVE-2022-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3640" } ], "notes": [ { "category": "general", "text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3640", "url": "https://www.suse.com/security/cve/CVE-2022-3640" }, { "category": "external", "summary": "SUSE Bug 1204619 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1204619" }, { "category": "external", "summary": "SUSE Bug 1204624 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1204624" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-3640" }, { "cve": "CVE-2022-40982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-40982" } ], "notes": [ { "category": "general", "text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-40982", "url": "https://www.suse.com/security/cve/CVE-2022-40982" }, { "category": "external", "summary": "SUSE Bug 1206418 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1206418" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-40982" }, { "cve": "CVE-2022-41218", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41218" } ], "notes": [ { "category": "general", "text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41218", "url": "https://www.suse.com/security/cve/CVE-2022-41218" }, { "category": "external", "summary": "SUSE Bug 1202960 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1202960" }, { "category": "external", "summary": "SUSE Bug 1203606 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1203606" }, { "category": "external", "summary": "SUSE Bug 1205313 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1205313" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-41218" }, { "cve": "CVE-2022-41674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41674" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41674", "url": "https://www.suse.com/security/cve/CVE-2022-41674" }, { "category": "external", "summary": "SUSE Bug 1203770 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1203770" }, { "category": "external", "summary": "SUSE Bug 1203994 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1203994" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-41674" }, { "cve": "CVE-2022-42719", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42719" } ], "notes": [ { "category": "general", "text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42719", "url": "https://www.suse.com/security/cve/CVE-2022-42719" }, { "category": "external", "summary": "SUSE Bug 1204051 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1204051" }, { "category": "external", "summary": "SUSE Bug 1204292 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1204292" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42719" }, { "cve": "CVE-2022-42720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42720" } ], "notes": [ { "category": "general", "text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42720", "url": "https://www.suse.com/security/cve/CVE-2022-42720" }, { "category": "external", "summary": "SUSE Bug 1204059 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1204059" }, { "category": "external", "summary": "SUSE Bug 1204291 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1204291" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42720" }, { "cve": "CVE-2022-42721", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42721" } ], "notes": [ { "category": "general", "text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42721", "url": "https://www.suse.com/security/cve/CVE-2022-42721" }, { "category": "external", "summary": "SUSE Bug 1204060 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1204060" }, { "category": "external", "summary": "SUSE Bug 1204290 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1204290" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42721" }, { "cve": "CVE-2022-42722", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42722" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42722", "url": "https://www.suse.com/security/cve/CVE-2022-42722" }, { "category": "external", "summary": "SUSE Bug 1204125 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1204125" }, { "category": "external", "summary": "SUSE Bug 1204289 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1204289" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42722" }, { "cve": "CVE-2022-4379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4379" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4379", "url": "https://www.suse.com/security/cve/CVE-2022-4379" }, { "category": "external", "summary": "SUSE Bug 1206209 for CVE-2022-4379", "url": "https://bugzilla.suse.com/1206209" }, { "category": "external", "summary": "SUSE Bug 1206373 for CVE-2022-4379", "url": "https://bugzilla.suse.com/1206373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-4379" }, { "cve": "CVE-2022-44032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44032" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44032", "url": "https://www.suse.com/security/cve/CVE-2022-44032" }, { "category": "external", "summary": "SUSE Bug 1204894 for CVE-2022-44032", "url": "https://bugzilla.suse.com/1204894" }, { "category": "external", "summary": "SUSE Bug 1212290 for CVE-2022-44032", "url": "https://bugzilla.suse.com/1212290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44032" }, { "cve": "CVE-2022-44033", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44033" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44033", "url": "https://www.suse.com/security/cve/CVE-2022-44033" }, { "category": "external", "summary": "SUSE Bug 1204922 for CVE-2022-44033", "url": "https://bugzilla.suse.com/1204922" }, { "category": "external", "summary": "SUSE Bug 1212306 for CVE-2022-44033", "url": "https://bugzilla.suse.com/1212306" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44033" }, { "cve": "CVE-2022-44034", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44034" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44034", "url": "https://www.suse.com/security/cve/CVE-2022-44034" }, { "category": "external", "summary": "SUSE Bug 1204901 for CVE-2022-44034", "url": "https://bugzilla.suse.com/1204901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44034" }, { "cve": "CVE-2022-45884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45884" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45884", "url": "https://www.suse.com/security/cve/CVE-2022-45884" }, { "category": "external", "summary": "SUSE Bug 1205756 for CVE-2022-45884", "url": "https://bugzilla.suse.com/1205756" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45885" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45885", "url": "https://www.suse.com/security/cve/CVE-2022-45885" }, { "category": "external", "summary": "SUSE Bug 1205758 for CVE-2022-45885", "url": "https://bugzilla.suse.com/1205758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45886" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45886", "url": "https://www.suse.com/security/cve/CVE-2022-45886" }, { "category": "external", "summary": "SUSE Bug 1205760 for CVE-2022-45886", "url": "https://bugzilla.suse.com/1205760" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45887" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45887", "url": "https://www.suse.com/security/cve/CVE-2022-45887" }, { "category": "external", "summary": "SUSE Bug 1205762 for CVE-2022-45887", "url": "https://bugzilla.suse.com/1205762" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2022-45887", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45888" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45888", "url": "https://www.suse.com/security/cve/CVE-2022-45888" }, { "category": "external", "summary": "SUSE Bug 1205764 for CVE-2022-45888", "url": "https://bugzilla.suse.com/1205764" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45888" }, { "cve": "CVE-2022-45919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45919" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45919", "url": "https://www.suse.com/security/cve/CVE-2022-45919" }, { "category": "external", "summary": "SUSE Bug 1205803 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1205803" }, { "category": "external", "summary": "SUSE Bug 1208600 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1208600" }, { "category": "external", "summary": "SUSE Bug 1208912 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1208912" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45934" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45934", "url": "https://www.suse.com/security/cve/CVE-2022-45934" }, { "category": "external", "summary": "SUSE Bug 1205796 for CVE-2022-45934", "url": "https://bugzilla.suse.com/1205796" }, { "category": "external", "summary": "SUSE Bug 1212292 for CVE-2022-45934", "url": "https://bugzilla.suse.com/1212292" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45934" }, { "cve": "CVE-2023-0045", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0045" } ], "notes": [ { "category": "general", "text": "The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0045", "url": "https://www.suse.com/security/cve/CVE-2023-0045" }, { "category": "external", "summary": "SUSE Bug 1207773 for CVE-2023-0045", "url": "https://bugzilla.suse.com/1207773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-0045" }, { "cve": "CVE-2023-1076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1076" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1076", "url": "https://www.suse.com/security/cve/CVE-2023-1076" }, { "category": "external", "summary": "SUSE Bug 1208599 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1208599" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1078" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1078", "url": "https://www.suse.com/security/cve/CVE-2023-1078" }, { "category": "external", "summary": "SUSE Bug 1208601 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208601" }, { "category": "external", "summary": "SUSE Bug 1208603 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208603" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-1078" }, { "cve": "CVE-2023-1192", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1192" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1192", "url": "https://www.suse.com/security/cve/CVE-2023-1192" }, { "category": "external", "summary": "SUSE Bug 1208995 for CVE-2023-1192", "url": "https://bugzilla.suse.com/1208995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-1192" }, { "cve": "CVE-2023-1380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1380" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1380", "url": "https://www.suse.com/security/cve/CVE-2023-1380" }, { "category": "external", "summary": "SUSE Bug 1209287 for CVE-2023-1380", "url": "https://bugzilla.suse.com/1209287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-1380" }, { "cve": "CVE-2023-20569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20569" } ], "notes": [ { "category": "general", "text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20569", "url": "https://www.suse.com/security/cve/CVE-2023-20569" }, { "category": "external", "summary": "SUSE Bug 1213287 for CVE-2023-20569", "url": "https://bugzilla.suse.com/1213287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-20569" }, { "cve": "CVE-2023-20593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20593" } ], "notes": [ { "category": "general", "text": "An issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20593", "url": "https://www.suse.com/security/cve/CVE-2023-20593" }, { "category": "external", "summary": "SUSE Bug 1213286 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213286" }, { "category": "external", "summary": "SUSE Bug 1213616 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213616" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-20593" }, { "cve": "CVE-2023-2124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2124" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2124", "url": "https://www.suse.com/security/cve/CVE-2023-2124" }, { "category": "external", "summary": "SUSE Bug 1210498 for CVE-2023-2124", "url": "https://bugzilla.suse.com/1210498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-2124" }, { "cve": "CVE-2023-31084", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31084" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(\u0026fepriv-\u003esem) is called. However, wait_event_interruptible would put the process to sleep, and down(\u0026fepriv-\u003esem) may block the process.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31084", "url": "https://www.suse.com/security/cve/CVE-2023-31084" }, { "category": "external", "summary": "SUSE Bug 1210783 for CVE-2023-31084", "url": "https://bugzilla.suse.com/1210783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3141" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3141", "url": "https://www.suse.com/security/cve/CVE-2023-3141" }, { "category": "external", "summary": "SUSE Bug 1212129 for CVE-2023-3141", "url": "https://bugzilla.suse.com/1212129" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-3141", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-3141" }, { "cve": "CVE-2023-3269", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3269" } ], "notes": [ { "category": "general", "text": "A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3269", "url": "https://www.suse.com/security/cve/CVE-2023-3269" }, { "category": "external", "summary": "SUSE Bug 1212395 for CVE-2023-3269", "url": "https://bugzilla.suse.com/1212395" }, { "category": "external", "summary": "SUSE Bug 1213760 for CVE-2023-3269", "url": "https://bugzilla.suse.com/1213760" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-3269" }, { "cve": "CVE-2023-39192", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-39192" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-39192", "url": "https://www.suse.com/security/cve/CVE-2023-39192" }, { "category": "external", "summary": "SUSE Bug 1215858 for CVE-2023-39192", "url": "https://bugzilla.suse.com/1215858" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-39192", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-39192" }, { "cve": "CVE-2023-39193", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-39193" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-39193", "url": "https://www.suse.com/security/cve/CVE-2023-39193" }, { "category": "external", "summary": "SUSE Bug 1215860 for CVE-2023-39193", "url": "https://bugzilla.suse.com/1215860" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-39193", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-39193" }, { "cve": "CVE-2023-4128", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4128" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4128", "url": "https://www.suse.com/security/cve/CVE-2023-4128" }, { "category": "external", "summary": "SUSE Bug 1214149 for CVE-2023-4128", "url": "https://bugzilla.suse.com/1214149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-4128" }, { "cve": "CVE-2023-4134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4134" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4134", "url": "https://www.suse.com/security/cve/CVE-2023-4134" }, { "category": "external", "summary": "SUSE Bug 1213971 for CVE-2023-4134", "url": "https://bugzilla.suse.com/1213971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4134" }, { "cve": "CVE-2023-4194", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4194" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode-\u003ei_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4194", "url": "https://www.suse.com/security/cve/CVE-2023-4194" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-4194", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4194" }, { "cve": "CVE-2023-42753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42753" } ], "notes": [ { "category": "general", "text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42753", "url": "https://www.suse.com/security/cve/CVE-2023-42753" }, { "category": "external", "summary": "SUSE Bug 1215150 for CVE-2023-42753", "url": "https://bugzilla.suse.com/1215150" }, { "category": "external", "summary": "SUSE Bug 1218613 for CVE-2023-42753", "url": "https://bugzilla.suse.com/1218613" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-42753" }, { "cve": "CVE-2023-42754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42754" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42754", "url": "https://www.suse.com/security/cve/CVE-2023-42754" }, { "category": "external", "summary": "SUSE Bug 1215467 for CVE-2023-42754", "url": "https://bugzilla.suse.com/1215467" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-42754", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-42754" }, { "cve": "CVE-2023-42756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42756" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42756", "url": "https://www.suse.com/security/cve/CVE-2023-42756" }, { "category": "external", "summary": "SUSE Bug 1215767 for CVE-2023-42756", "url": "https://bugzilla.suse.com/1215767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-42756" }, { "cve": "CVE-2023-4623", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4623" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4623", "url": "https://www.suse.com/security/cve/CVE-2023-4623" }, { "category": "external", "summary": "SUSE Bug 1215115 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1215115" }, { "category": "external", "summary": "SUSE Bug 1215440 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1215440" }, { "category": "external", "summary": "SUSE Bug 1217444 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1217444" }, { "category": "external", "summary": "SUSE Bug 1217531 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1217531" }, { "category": "external", "summary": "SUSE Bug 1219698 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1219698" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1221598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-4623" }, { "cve": "CVE-2023-46813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46813" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46813", "url": "https://www.suse.com/security/cve/CVE-2023-46813" }, { "category": "external", "summary": "SUSE Bug 1212649 for CVE-2023-46813", "url": "https://bugzilla.suse.com/1212649" }, { "category": "external", "summary": "SUSE Bug 1216896 for CVE-2023-46813", "url": "https://bugzilla.suse.com/1216896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-46813" }, { "cve": "CVE-2023-4881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4881" } ], "notes": [ { "category": "general", "text": "CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4881", "url": "https://www.suse.com/security/cve/CVE-2023-4881" }, { "category": "external", "summary": "SUSE Bug 1215221 for CVE-2023-4881", "url": "https://bugzilla.suse.com/1215221" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4881" }, { "cve": "CVE-2023-5345", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-5345" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s fs/smb/client component can be exploited to achieve local privilege escalation.\n\nIn case of an error in smb3_fs_context_parse_param, ctx-\u003epassword was freed but the field was not set to NULL which could lead to double free.\n\nWe recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-5345", "url": "https://www.suse.com/security/cve/CVE-2023-5345" }, { "category": "external", "summary": "SUSE Bug 1215899 for CVE-2023-5345", "url": "https://bugzilla.suse.com/1215899" }, { "category": "external", "summary": "SUSE Bug 1215971 for CVE-2023-5345", "url": "https://bugzilla.suse.com/1215971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-5345" }, { "cve": "CVE-2023-6606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6606" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6606", "url": "https://www.suse.com/security/cve/CVE-2023-6606" }, { "category": "external", "summary": "SUSE Bug 1217947 for CVE-2023-6606", "url": "https://bugzilla.suse.com/1217947" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-6606", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-6606" }, { "cve": "CVE-2023-6610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6610" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6610", "url": "https://www.suse.com/security/cve/CVE-2023-6610" }, { "category": "external", "summary": "SUSE Bug 1217946 for CVE-2023-6610", "url": "https://bugzilla.suse.com/1217946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-6610" } ] }
opensuse-su-2020:2112-1
Vulnerability from csaf_opensuse
Published
2020-11-29 15:25
Modified
2020-11-29 15:25
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' aka 'BadChoice' (bsc#1177725).
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code in the Linux kernel could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452 (bnc#1176381).
- CVE-2020-25645: Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1177511).
- CVE-2020-25643: Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (bnc#1177206).
- CVE-2020-25641: A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allowed a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability (bnc#1177121).
- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-25668: Make FONTX ioctl use the tty pointer they were actually passed (bsc#1178123).
- CVE-2020-25656: Extend func_buf_lock to readers (bnc#1177766).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812 (bnc#1176485).
- CVE-2020-14351: Fixed race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-8694: Restrict energy meter to root access (bsc#1170415).
- CVE-2020-16120: Check permission to open real file in overlayfs (bsc#1177470).
- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)
The following non-security bugs were fixed:
- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: Always build evged in (git-fixes).
- ACPI: button: fix handling lid state changes when input device closed (git-fixes).
- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).
- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).
- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- ACPI / extlog: Check for RDMSR failure (git-fixes).
- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).
- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).
- Add CONFIG_CHECK_CODESIGN_EKU
- airo: Fix read overflows sending packets (git-fixes).
- ALSA: ac97: (cosmetic) align argument names (git-fixes).
- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: asihpi: fix spellint typo in comments (git-fixes).
- ALSA: atmel: ac97: clarify operator precedence (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card->ctl_files_rwlock (git-fixes).
- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: fix kernel-doc markups (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda: (cosmetic) align function parameters (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).
- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - Enable headphone for ASUS TM420 (git-fixes).
- ALSA: hda/realtek - Fixed HP headset Mic can't be detected (git-fixes).
- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hdspm: Fix typo arbitary (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: portman2x4: fix repeated word 'if' (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: sparc: dbri: fix repeated word 'the' (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -> 'Frequency' (git-fixes).
- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).
- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).
- ALSA: vx: vx_core: clarify operator precedence (git-fixes).
- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ASoC: codecs: wcd9335: Set digital gain range correctly (git-fixes).
- ASoC: cs42l51: manage mclk shutdown delay (git-fixes).
- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).
- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: Intel: kbl_rt5663_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ASoC: qcom: sdm845: set driver name correctly (git-fixes).
- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).
- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ata: sata_rcar: Fix DMA boundary mask (git-fixes).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blk-mq: order adding requests to hctx->dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi->io_pages is always initialized (bsc#1177749).
- block: Fix page_is_mergeable() for compound pages (bsc#1177814).
- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).
- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).
- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: Account for merged patches upstream Move below patches to sorted section.
- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).
- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: cleanup cow block on error (bsc#1178584).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: drop path before adding new uuid tree entry (bsc#1178176).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- btrfs: fix filesystem corruption after a device replace (bsc#1178395).
- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).
- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).
- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: reschedule if necessary when logging directory items (bsc#1178585).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- btrfs: send, orphanize first all conflicting inodes when processing references (bsc#1178579).
- btrfs: send, recompute reference path after orphanization of a directory (bsc#1178581).
- btrfs: set the correct lockdep class for new nodes (bsc#1178184).
- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).
- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- can: flexcan: flexcan_remove(): disable wakeup completely (git-fixes).
- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).
- can: flexcan: remove FLEXCAN_QUIRK_DISABLE_MECR quirk for LS1021A (git-fixes).
- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).
- can: peak_usb: add range checking in decode operations (git-fixes).
- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).
- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- ceph: promote to unsigned long long before shifting (bsc#1178175).
- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).
- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).
- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states are disabled (bnc#1176588).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ccp - fix error handling (git-fixes).
- crypto: dh - check validity of Z before export (bsc#1175718).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: ecdh - check validity of Z before export (bsc#1175718).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).
- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- dax: Fix compilation for CONFIG_DAX && !CONFIG_FS_DAX (bsc#1177817).
- Disable module compression on SLE15 SP2 (bsc#1178307)
- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).
- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).
- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).
- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).
- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).
- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).
- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).
- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).
- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).
- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).
- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).
- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).
- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).
- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).
- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).
- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).
- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).
- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).
- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).
- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).
- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).
- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).
- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).
- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).
- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).
- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).
- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).
- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).
- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).
- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).
- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).
- dm: Call proper helper to determine dax support (bsc#1177817).
- dm/dax: Fix table reference counts (bsc#1178246).
- docs: driver-api: remove a duplicated index entry (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drivers: watchdog: rdc321x_wdt: Fix race condition bugs (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- exfat: fix name_hash computation on big endian systems (git-fixes).
- exfat: fix overflow issue in exfat_cluster_to_sector() (git-fixes).
- exfat: fix possible memory leak in exfat_find() (git-fixes).
- exfat: fix use of uninitialized spinlock on error path (git-fixes).
- exfat: fix wrong hint_stat initialization in exfat_find_dir_entry() (git-fixes).
- exfat: fix wrong size update of stream entry by typo (git-fixes).
- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).
- futex: Consistently use fshared as boolean (bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).
- futex: Remove put_futex_key() (bsc#1149032).
- futex: Remove unused or redundant includes (bsc#1149032).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: hid-input: fix stylus battery reporting (git-fixes).
- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).
- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- ibmvnic: save changed mac address to adapter->mac_addr (bsc#1134760 ltc#177449 git-fixes).
- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- ida: Free allocated bitmap in error path (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: Do not ignore errors from crypto_shash_update() (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: stmfts - fix a & vs && typo (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: trackpoint - enable Synaptics trackpoints (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).
- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).
- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).
- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).
- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).
- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).
- ipvlan: fix device features (networking-stable-20_08_24).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kabi fix for NFS: Fix flexfiles read failover (git-fixes).
- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).
- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- kernel-binary.spec.in: Exclude .config.old from kernel-devel - use tar excludes for .kernel-binary.spec.buildenv
- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.
- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).
- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- leds: mt6323: move period calculation (git-fixes).
- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).
- libceph: clear con->out_msg on Policy::stateful_server faults (bsc#1178177).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- lib/mpi: Add mpi_sub_ui() (bsc#1175718).
- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: handle lack of sband->bitrates in rates (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).
- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).
- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).
- media: imx274: fix frame interval handling (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: platform: Improve queue set up flow for bug fixing (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: uvcvideo: Fix dereference of out-of-bound list iterator (git-fixes).
- media: uvcvideo: Fix uvc_ctrl_fixup_xu_info() not having any effect (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm: do not panic when links can't be created in sysfs (bsc#1178002).
- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).
- mm: fix a race during THP splitting (bsc#1178255).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm: madvise: fix vma user-after-free (git-fixes).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm: replace memmap_context by meminit_context (bsc#1178002).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692).
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- mm/swapfile.c: fix potential memory leak in sys_swapon (git-fixes).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- module: Correctly truncate sysfs sections output (git-fixes).
- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).
- module: Refactor section attr into bin attribute (git-fixes).
- module: statically initialize init section freeing data (git-fixes).
- Move upstreamed BT patch into sorted section
- Move upstreamed intel-vbtn patch into sorted section
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi->cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).
- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).
- mtd: spinand: gigadevice: Add QE Bit (git-fixes).
- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).
- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: dsa: b53: check for timeout (networking-stable-20_08_24).
- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).
- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).
- net: Fix bridge enslavement failure (networking-stable-20_09_24).
- net: Fix potential wrong skb->protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).
- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).
- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).
- net: lantiq: Wake TX queue again (networking-stable-20_09_24).
- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).
- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).
- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).
- net: mscc: ocelot: fix race condition with TX timestamping (bsc#1178461).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).
- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).
- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- nfp: use correct define to return NONE fec (networking-stable-20_09_24).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- nfs: ensure correct writeback errors are returned on close() (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- nfs: Fix security label length not being reset (bsc#1176381).
- nfs: nfs_file_write() should check for writeback errors (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- overflow: Include header file with SIZE_MAX declaration (git-fixes).
- p54: avoid accessing the data mapped to streaming DMA (git-fixes).
- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).
- PCI/ACPI: Whitelist hotplug ports for D3 if power managed by ACPI (git-fixes).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).
- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).
- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification.
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- PM: runtime: Drop runtime PM references to supplier on link removal (git-fixes).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- power: supply: bq27xxx: report 'not charging' on all types (git-fixes).
- power: supply: max17040: Correct voltage reading (git-fixes).
- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).
- pwm: img: Fix null pointer access in probe (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).
- r8169: fix operation under forced interrupt threading (git-fixes).
- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).
- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).
- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: rx8010: do not modify the global rtc ops (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- rtl8xxxu: prevent potential memory leak (git-fixes).
- rtw88: increse the size of rx buffer size (git-fixes).
- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).
- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Avoid creating large imbalances at task creation time (bnc#1176588).
- sched/numa: Check numa balancing information only when enabled (bnc#1176588).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- selftests/timers: Turn off timeout setting (git-fixes).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_mtk: Fix uart_get_baud_rate warning (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- slimbus: core: check get_addr before removing laddr ida (git-fixes).
- slimbus: core: do not enter to clock pause mode in core (git-fixes).
- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).
- soc: fsl: qbman: Fix return value on success (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc->setup() fails (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: spi-s3c64xx: Check return values (git-fixes).
- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).
- staging: octeon: repair 'fixed-link' support (git-fixes).
- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).
- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).
- SUNRPC: Revert 241b1f419f0e ('SUNRPC: Remove xdr_buf_trim()') (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- taprio: Fix allowing too small intervals (networking-stable-20_09_24).
- target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).
- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).
- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).
- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).
- target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch: (bsc#1177090).
- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).
- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).
- target-rbd-support-COMPARE_AND_WRITE.patch: (bsc#1177090).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb->data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tracing: Check return value of __create_val_fields() before using its result (git-fixes).
- tracing: Save normal string variables (git-fixes).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- uio: free uio id after uio file node is freed (git-fixes).
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- Update patches.suse/target-add-rbd-backend.patch: (). (simplify block to byte calculations and use consistent error paths)
- USB: adutux: fix debugging (git-fixes).
- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- usb: cdc-acm: fix cooldown mechanism (git-fixes).
- USB: cdc-acm: handle broken union descriptors (git-fixes).
- USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- usb: core: Solve race condition in anchor cleanup functions (git-fixes).
- usb: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- usb: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- usb: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- usb: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- usb: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- usb: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).
- usb: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- usb: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).
- usb: dwc3: simple: add support for Hikey 970 (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- usb: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- usb: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- usblp: fix race between disconnect() and read() (git-fixes).
- usb: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).
- usb: ohci: Default to per-port over-current protection (git-fixes).
- USB: serial: cyberjack: fix write-URB completion race (git-fixes).
- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).
- USB: serial: option: add Cellient MPL200 card (git-fixes).
- USB: serial: option: Add Telit FT980-KS composition (git-fixes).
- USB: serial: pl2303: add device-id for HP GC device (git-fixes).
- USB: serial: qcserial: fix altsetting probing (git-fixes).
- usb: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).
- usb: xhci-mtk: Fix typo (git-fixes).
- usb: xhci: omit duplicate actions when suspending a runtime suspended host (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).
- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).
- watchdog: Use put_device on error (git-fixes).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode->i_io_list with inode->i_lock (bsc#1177755).
- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).
- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).
- x86/ioapic: Unbreak check_timer() (bsc#1152489).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).
- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xfs: complain if anyone tries to create a too-large buffer log item (bsc#1166146).
- xfs: do not update mtime on COW faults (bsc#1167030).
- xfs: fix high key handling in the rt allocator's query_range function (git-fixes).
- xfs: fix scrub flagging rtinherit even if there is no rt device (git-fixes).
- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).
- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).
- xfs: force the log after remapping a synchronous-writes file (git-fixes).
- xfs: introduce XFS_MAX_FILEOFF (bsc#1166166).
- xfs: limit entries returned when counting fsmap records (git-fixes).
- xfs: remove unused variable 'done' (bsc#1166166).
- xfs: set xefi_discard when creating a deferred agfl free log intent item (git-fixes).
- xfs: truncate should remove all blocks, not just to the end of the page cache (bsc#1166166).
- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).
- xprtrdma: fix incorrect header size calculations (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
Patchnames
openSUSE-2020-2112
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724).\n- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka \u0027BleedingTooth\u0027 aka \u0027BadVibes\u0027 (bsc#1177726).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadChoice\u0027 (bsc#1177725).\n- CVE-2020-25212: A TOCTOU mismatch in the NFS client code in the Linux kernel could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452 (bnc#1176381).\n- CVE-2020-25645: Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1177511).\n- CVE-2020-25643: Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (bnc#1177206).\n- CVE-2020-25641: A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allowed a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability (bnc#1177121).\n- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).\n- CVE-2020-25668: Make FONTX ioctl use the tty pointer they were actually passed (bsc#1178123).\n- CVE-2020-25656: Extend func_buf_lock to readers (bnc#1177766).\n- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812 (bnc#1176485).\n- CVE-2020-14351: Fixed race in the perf_mmap_close() function (bsc#1177086).\n- CVE-2020-8694: Restrict energy meter to root access (bsc#1170415).\n- CVE-2020-16120: Check permission to open real file in overlayfs (bsc#1177470).\n- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix memory leak in v9fs_mount (git-fixes).\n- ACPI: Always build evged in (git-fixes).\n- ACPI: button: fix handling lid state changes when input device closed (git-fixes).\n- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).\n- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).\n- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).\n- ACPI: EC: Reference count query handlers under lock (git-fixes).\n- ACPI / extlog: Check for RDMSR failure (git-fixes).\n- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).\n- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).\n- Add CONFIG_CHECK_CODESIGN_EKU\n- airo: Fix read overflows sending packets (git-fixes).\n- ALSA: ac97: (cosmetic) align argument names (git-fixes).\n- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).\n- ALSA: asihpi: fix spellint typo in comments (git-fixes).\n- ALSA: atmel: ac97: clarify operator precedence (git-fixes).\n- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).\n- ALSA: compress_offload: remove redundant initialization (git-fixes).\n- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).\n- ALSA: core: pcm: simplify locking for timers (git-fixes).\n- ALSA: core: timer: clarify operator precedence (git-fixes).\n- ALSA: core: timer: remove redundant assignment (git-fixes).\n- ALSA: ctl: Workaround for lockdep warning wrt card-\u003ectl_files_rwlock (git-fixes).\n- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).\n- ALSA: fix kernel-doc markups (git-fixes).\n- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).\n- ALSA: hda: (cosmetic) align function parameters (git-fixes).\n- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).\n- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).\n- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).\n- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).\n- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).\n- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).\n- ALSA: hda/realtek - Enable headphone for ASUS TM420 (git-fixes).\n- ALSA: hda/realtek - Fixed HP headset Mic can\u0027t be detected (git-fixes).\n- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).\n- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).\n- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).\n- ALSA: hdspm: Fix typo arbitary (git-fixes).\n- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).\n- ALSA: portman2x4: fix repeated word \u0027if\u0027 (git-fixes).\n- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).\n- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).\n- ALSA: sparc: dbri: fix repeated word \u0027the\u0027 (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).\n- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).\n- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).\n- ALSA: usb-audio: endpoint.c: fix repeated word \u0027there\u0027 (git-fixes).\n- ALSA: usb-audio: fix spelling mistake \u0027Frequence\u0027 -\u003e \u0027Frequency\u0027 (git-fixes).\n- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).\n- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).\n- ALSA: vx: vx_core: clarify operator precedence (git-fixes).\n- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).\n- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).\n- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).\n- ASoC: codecs: wcd9335: Set digital gain range correctly (git-fixes).\n- ASoC: cs42l51: manage mclk shutdown delay (git-fixes).\n- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).\n- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).\n- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).\n- ASoC: Intel: kbl_rt5663_max98927: Fix kabylake_ssp_fixup function (git-fixes).\n- ASoC: kirkwood: fix IRQ error handling (git-fixes).\n- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).\n- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).\n- ASoC: qcom: sdm845: set driver name correctly (git-fixes).\n- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).\n- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).\n- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).\n- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).\n- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).\n- ata: sata_rcar: Fix DMA boundary mask (git-fixes).\n- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).\n- ath10k: fix array out-of-bounds access (git-fixes).\n- ath10k: fix memory leak for tpc_stats_final (git-fixes).\n- ath10k: Fix the size used in a \u0027dma_free_coherent()\u0027 call in an error handling path (git-fixes).\n- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).\n- ath10k: provide survey info as accumulated data (git-fixes).\n- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).\n- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).\n- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).\n- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).\n- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).\n- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).\n- ath9k_htc: Use appropriate rs_datalen type (git-fixes).\n- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).\n- blk-mq: order adding requests to hctx-\u003edispatch and checking SCHED_RESTART (bsc#1177750).\n- block: ensure bdi-\u003eio_pages is always initialized (bsc#1177749).\n- block: Fix page_is_mergeable() for compound pages (bsc#1177814).\n- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).\n- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).\n- Bluetooth: Fix refcount use-after-free issue (git-fixes).\n- Bluetooth: guard against controllers sending zero\u0027d events (git-fixes).\n- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).\n- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).\n- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).\n- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).\n- Bluetooth: Only mark socket zapped after unlocking (git-fixes).\n- Bluetooth: prefetch channel before killing sock (git-fixes).\n- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).\n- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).\n- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).\n- brcmfmac: check ndev pointer (git-fixes).\n- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).\n- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).\n- btrfs: Account for merged patches upstream Move below patches to sorted section.\n- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).\n- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).\n- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).\n- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).\n- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).\n- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).\n- btrfs: block-group: refactor how we read one block group item (bsc#1176019).\n- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).\n- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).\n- btrfs: cleanup cow block on error (bsc#1178584).\n- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).\n- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).\n- btrfs: do not take an extra root ref at allocation time (bsc#1176019).\n- btrfs: drop logs when we\u0027ve aborted a transaction (bsc#1176019).\n- btrfs: drop path before adding new uuid tree entry (bsc#1178176).\n- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).\n- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).\n- btrfs: fix filesystem corruption after a device replace (bsc#1178395).\n- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).\n- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).\n- btrfs: fix race between page release and a fast fsync (bsc#1177687).\n- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).\n- btrfs: free block groups after free\u0027ing fs trees (bsc#1176019).\n- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).\n- btrfs: kill the subvol_srcu (bsc#1176019).\n- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).\n- btrfs: make inodes hold a ref on their roots (bsc#1176019).\n- btrfs: make the extent buffer leak check per fs info (bsc#1176019).\n- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).\n- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).\n- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).\n- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).\n- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).\n- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).\n- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).\n- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).\n- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).\n- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).\n- btrfs: release old extent maps during page release (bsc#1177687).\n- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).\n- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).\n- btrfs: rename member \u0027trimming\u0027 of block group to a more generic name (bsc#1176019).\n- btrfs: reschedule if necessary when logging directory items (bsc#1178585).\n- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).\n- btrfs: send, orphanize first all conflicting inodes when processing references (bsc#1178579).\n- btrfs: send, recompute reference path after orphanization of a directory (bsc#1178581).\n- btrfs: set the correct lockdep class for new nodes (bsc#1178184).\n- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).\n- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).\n- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).\n- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).\n- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).\n- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).\n- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).\n- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).\n- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).\n- can: flexcan: flexcan_remove(): disable wakeup completely (git-fixes).\n- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).\n- can: flexcan: remove FLEXCAN_QUIRK_DISABLE_MECR quirk for LS1021A (git-fixes).\n- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).\n- can: peak_usb: add range checking in decode operations (git-fixes).\n- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).\n- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).\n- can: softing: softing_card_shutdown(): add braces around empty body in an \u0027if\u0027 statement (git-fixes).\n- ceph: promote to unsigned long long before shifting (bsc#1178175).\n- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).\n- clk: at91: remove the checking of parent_name (git-fixes).\n- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).\n- clk: imx8mq: Fix usdhc parents order (git-fixes).\n- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).\n- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).\n- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).\n- clk: samsung: exynos4: mark \u0027chipid\u0027 clock as CLK_IGNORE_UNUSED (git-fixes).\n- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).\n- clk: tegra: Always program PLL_E when enabled (git-fixes).\n- clk/ti/adpll: allocate room for terminating null (git-fixes).\n- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).\n- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).\n- cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states are disabled (bnc#1176588).\n- create Storage / NVMe subsection\n- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).\n- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).\n- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).\n- crypto: ccp - fix error handling (git-fixes).\n- crypto: dh - check validity of Z before export (bsc#1175718).\n- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).\n- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).\n- crypto: ecdh - check validity of Z before export (bsc#1175718).\n- crypto: ixp4xx - Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).\n- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).\n- crypto: picoxcell - Fix potential race condition bug (git-fixes).\n- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).\n- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).\n- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).\n- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).\n- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).\n- dax: Fix compilation for CONFIG_DAX \u0026\u0026 !CONFIG_FS_DAX (bsc#1177817).\n- Disable module compression on SLE15 SP2 (bsc#1178307)\n- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).\n- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).\n- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).\n- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).\n- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).\n- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).\n- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).\n- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).\n- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).\n- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).\n- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).\n- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).\n- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).\n- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).\n- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).\n- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: tegra-apb: Prevent race conditions on channel\u0027s freeing (git-fixes).\n- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).\n- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).\n- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).\n- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).\n- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).\n- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).\n- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).\n- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).\n- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).\n- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).\n- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).\n- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).\n- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).\n- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).\n- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).\n- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).\n- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).\n- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).\n- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).\n- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).\n- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).\n- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).\n- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).\n- dm: Call proper helper to determine dax support (bsc#1177817).\n- dm/dax: Fix table reference counts (bsc#1178246).\n- docs: driver-api: remove a duplicated index entry (git-fixes).\n- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).\n- drivers: watchdog: rdc321x_wdt: Fix race condition bugs (git-fixes).\n- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).\n- drm/radeon: revert \u0027Prefer lower feedback dividers\u0027 (bsc#1177384).\n- drop Storage / bsc#1171688 subsection No effect on expanded tree.\n- e1000: Do not perform reset in reset_task if we are already down (git-fixes).\n- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).\n- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).\n- exfat: fix name_hash computation on big endian systems (git-fixes).\n- exfat: fix overflow issue in exfat_cluster_to_sector() (git-fixes).\n- exfat: fix possible memory leak in exfat_find() (git-fixes).\n- exfat: fix use of uninitialized spinlock on error path (git-fixes).\n- exfat: fix wrong hint_stat initialization in exfat_find_dir_entry() (git-fixes).\n- exfat: fix wrong size update of stream entry by typo (git-fixes).\n- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).\n- ftrace: Move RCU is watching check after recursion check (git-fixes).\n- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).\n- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).\n- futex: Consistently use fshared as boolean (bsc#1149032).\n- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).\n- futex: Remove put_futex_key() (bsc#1149032).\n- futex: Remove unused or redundant includes (bsc#1149032).\n- gpio: mockup: fix resource leak in error path (git-fixes).\n- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).\n- gpio: siox: explicitly support only threaded irqs (git-fixes).\n- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).\n- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).\n- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).\n- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).\n- HID: hid-input: fix stylus battery reporting (git-fixes).\n- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).\n- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).\n- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).\n- hwmon: (applesmc) check status earlier (git-fixes).\n- hwmon: (mlxreg-fan) Fix double \u0027Mellanox\u0027 (git-fixes).\n- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).\n- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).\n- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).\n- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).\n- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).\n- i2c: cpm: Fix i2c_ram structure (git-fixes).\n- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).\n- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).\n- i2c: meson: fix clock setting overwrite (git-fixes).\n- i2c: meson: fixup rate calculation with filter delay (git-fixes).\n- i2c: owl: Clear NACK and BUS error bits (git-fixes).\n- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).\n- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).\n- i2c: tegra: Restore pinmux on system resume (git-fixes).\n- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).\n- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).\n- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).\n- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).\n- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).\n- ibmvnic: save changed mac address to adapter-\u003emac_addr (bsc#1134760 ltc#177449 git-fixes).\n- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).\n- icmp: randomize the global rate limiter (git-fixes).\n- ida: Free allocated bitmap in error path (git-fixes).\n- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).\n- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).\n- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).\n- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).\n- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).\n- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).\n- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).\n- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).\n- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).\n- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).\n- ima: Do not ignore errors from crypto_shash_update() (git-fixes).\n- ima: extend boot_aggregate with kernel measurements (bsc#1177617).\n- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).\n- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).\n- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).\n- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).\n- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: stmfts - fix a \u0026 vs \u0026\u0026 typo (git-fixes).\n- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).\n- Input: trackpoint - enable Synaptics trackpoints (git-fixes).\n- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).\n- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).\n- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).\n- iommu/amd: Fix potential @entry null deref (bsc#1177283).\n- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).\n- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).\n- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).\n- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).\n- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).\n- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).\n- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).\n- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).\n- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).\n- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).\n- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).\n- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).\n- ipvlan: fix device features (networking-stable-20_08_24).\n- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).\n- kabi fix for NFS: Fix flexfiles read failover (git-fixes).\n- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).\n- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.\n- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).\n- kbuild: enforce -Werror=return-type (bsc#1177281).\n- kernel-binary.spec.in: Exclude .config.old from kernel-devel - use tar excludes for .kernel-binary.spec.buildenv\n- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.\n- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).\n- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).\n- leds: mlxreg: Fix possible buffer overflow (git-fixes).\n- leds: mt6323: move period calculation (git-fixes).\n- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).\n- libceph: clear con-\u003eout_msg on Policy::stateful_server faults (bsc#1178177).\n- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).\n- lib/mpi: Add mpi_sub_ui() (bsc#1175718).\n- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).\n- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).\n- mac80211: handle lack of sband-\u003ebitrates in rates (git-fixes).\n- mac80211: skip mpath lookup also for control port tx (git-fixes).\n- mac802154: tx: fix use-after-free (git-fixes).\n- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).\n- mailbox: avoid timer start from callback (git-fixes).\n- media: ati_remote: sanity check for both endpoints (git-fixes).\n- media: bdisp: Fix runtime PM imbalance on error (git-fixes).\n- media: camss: Fix a reference count leak (git-fixes).\n- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).\n- media: exynos4-is: Fix a reference count leak (git-fixes).\n- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).\n- media: firewire: fix memory leak (git-fixes).\n- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).\n- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).\n- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).\n- media: imx274: fix frame interval handling (git-fixes).\n- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).\n- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).\n- media: media/pci: prevent memory leak in bttv_probe (git-fixes).\n- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).\n- media: omap3isp: Fix memleak in isp_probe (git-fixes).\n- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).\n- media: platform: fcp: Fix a reference count leak (git-fixes).\n- media: platform: Improve queue set up flow for bug fixing (git-fixes).\n- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).\n- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).\n- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).\n- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).\n- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).\n- media: rcar-vin: Fix a reference count leak (git-fixes).\n- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).\n- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).\n- media: Revert \u0027media: exynos4-is: Add missed check for pinctrl_lookup_state()\u0027 (git-fixes).\n- media: rockchip/rga: Fix a reference count leak (git-fixes).\n- media: s5p-mfc: Fix a reference count leak (git-fixes).\n- media: saa7134: avoid a shift overflow (git-fixes).\n- media: smiapp: Fix error handling at NVM reading (git-fixes).\n- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).\n- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).\n- media: sti: Fix reference count leaks (git-fixes).\n- media: stm32-dcmi: Fix a reference count leak (git-fixes).\n- media: tc358743: cleanup tc358743_cec_isr (git-fixes).\n- media: tc358743: initialize variable (git-fixes).\n- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).\n- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).\n- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).\n- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).\n- media: usbtv: Fix refcounting mixup (git-fixes).\n- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).\n- media: uvcvideo: Fix dereference of out-of-bound list iterator (git-fixes).\n- media: uvcvideo: Fix uvc_ctrl_fixup_xu_info() not having any effect (git-fixes).\n- media: uvcvideo: Set media controller entity functions (git-fixes).\n- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).\n- media: v4l2-async: Document asd allocation requirements (git-fixes).\n- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).\n- media: vsp1: Fix runtime PM imbalance on error (git-fixes).\n- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).\n- memory: omap-gpmc: Fix a couple off by ones (git-fixes).\n- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).\n- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).\n- mfd: sm501: Fix leaks in probe() (git-fixes).\n- mic: vop: copy data to kernel space then write to io memory (git-fixes).\n- misc: mic: scif: Fix error handling path (git-fixes).\n- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).\n- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).\n- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).\n- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).\n- mmc: core: Rework wp-gpio handling (git-fixes).\n- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).\n- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).\n- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).\n- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).\n- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).\n- mm: do not panic when links can\u0027t be created in sysfs (bsc#1178002).\n- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).\n- mm: fix a race during THP splitting (bsc#1178255).\n- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).\n- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).\n- mm: madvise: fix vma user-after-free (git-fixes).\n- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).\n- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).\n- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).\n- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).\n- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).\n- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).\n- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).\n- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).\n- mm: replace memmap_context by meminit_context (bsc#1178002).\n- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).\n- mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692).\n- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692).\n- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).\n- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).\n- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).\n- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).\n- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).\n- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).\n- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).\n- mm/swapfile.c: fix potential memory leak in sys_swapon (git-fixes).\n- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).\n- module: Correctly truncate sysfs sections output (git-fixes).\n- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).\n- module: Refactor section attr into bin attribute (git-fixes).\n- module: statically initialize init section freeing data (git-fixes).\n- Move upstreamed BT patch into sorted section\n- Move upstreamed intel-vbtn patch into sorted section\n- mt76: add missing locking around ampdu action (git-fixes).\n- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).\n- mt76: do not use devm API for led classdev (git-fixes).\n- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).\n- mt76: fix LED link time failure (git-fixes).\n- mtd: cfi_cmdset_0002: do not free cfi-\u003ecfiq in error path of cfi_amdstd_setup() (git-fixes).\n- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).\n- mtd: lpddr: fix excessive stack usage with clang (git-fixes).\n- mtd: mtdoops: Do not write panic data twice (git-fixes).\n- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).\n- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).\n- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).\n- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).\n- mtd: spinand: gigadevice: Add QE Bit (git-fixes).\n- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).\n- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).\n- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).\n- mwifiex: fix double free (git-fixes).\n- mwifiex: remove function pointer check (git-fixes).\n- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).\n- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).\n- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).\n- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).\n- net: disable netpoll on fresh napis (networking-stable-20_09_11).\n- net: dsa: b53: check for timeout (networking-stable-20_08_24).\n- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).\n- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).\n- net: Fix bridge enslavement failure (networking-stable-20_09_24).\n- net: Fix potential wrong skb-\u003eprotocol in skb_vlan_untag() (networking-stable-20_08_24).\n- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).\n- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).\n- netlabel: fix problems with mapping removal (networking-stable-20_09_11).\n- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).\n- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).\n- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).\n- net: lantiq: Wake TX queue again (networking-stable-20_09_24).\n- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).\n- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).\n- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).\n- net: mscc: ocelot: fix race condition with TX timestamping (bsc#1178461).\n- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).\n- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).\n- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).\n- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).\n- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).\n- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).\n- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).\n- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).\n- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).\n- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).\n- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).\n- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).\n- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).\n- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).\n- nfp: use correct define to return NONE fec (networking-stable-20_09_24).\n- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).\n- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).\n- NFS: Do not return layout segments that are in use (git-fixes).\n- nfs: ensure correct writeback errors are returned on close() (git-fixes).\n- NFS: Fix flexfiles read failover (git-fixes).\n- nfs: Fix security label length not being reset (bsc#1176381).\n- nfs: nfs_file_write() should check for writeback errors (git-fixes).\n- NFSv4.2: fix client\u0027s attribute cache management for copy_file_range (git-fixes).\n- nl80211: fix non-split wiphy information (git-fixes).\n- NTB: hw: amd: fix an issue about leak system resources (git-fixes).\n- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).\n- nvme-multipath: retry commands for dying queues (bsc#1171688).\n- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).\n- nvme-rdma: fix crash when connect rejected (bsc#1174748).\n- overflow: Include header file with SIZE_MAX declaration (git-fixes).\n- p54: avoid accessing the data mapped to streaming DMA (git-fixes).\n- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).\n- PCI/ACPI: Whitelist hotplug ports for D3 if power managed by ACPI (git-fixes).\n- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).\n- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).\n- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).\n- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).\n- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).\n- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).\n- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).\n- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).\n- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).\n- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).\n- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).\n- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification.\n- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).\n- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).\n- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).\n- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).\n- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).\n- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).\n- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).\n- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).\n- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).\n- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).\n- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).\n- PM: runtime: Drop runtime PM references to supplier on link removal (git-fixes).\n- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).\n- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).\n- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).\n- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).\n- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).\n- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).\n- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).\n- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).\n- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).\n- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).\n- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).\n- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).\n- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).\n- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).\n- power: supply: bq27xxx: report \u0027not charging\u0027 on all types (git-fixes).\n- power: supply: max17040: Correct voltage reading (git-fixes).\n- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).\n- pwm: img: Fix null pointer access in probe (git-fixes).\n- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).\n- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).\n- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).\n- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).\n- r8169: fix data corruption issue on RTL8402 (bsc#1174098).\n- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).\n- r8169: fix operation under forced interrupt threading (git-fixes).\n- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).\n- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).\n- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).\n- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).\n- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).\n- regulator: axp20x: fix LDO2/4 description (git-fixes).\n- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).\n- regulator: resolve supply after creating regulator (git-fixes).\n- rename Other drivers / Intel IOMMU subsection to IOMMU\n- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).\n- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).\n- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)\n- rtc: ds1374: fix possible race condition (git-fixes).\n- rtc: rx8010: do not modify the global rtc ops (git-fixes).\n- rtc: sa1100: fix possible race condition (git-fixes).\n- rtl8xxxu: prevent potential memory leak (git-fixes).\n- rtw88: increse the size of rx buffer size (git-fixes).\n- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).\n- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).\n- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/numa: Avoid creating large imbalances at task creation time (bnc#1176588).\n- sched/numa: Check numa balancing information only when enabled (bnc#1176588).\n- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).\n- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).\n- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).\n- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).\n- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove unneeded variable \u0027rval\u0027 (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).\n- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).\n- selftests/timers: Turn off timeout setting (git-fixes).\n- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).\n- serial: 8250_mtk: Fix uart_get_baud_rate warning (git-fixes).\n- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).\n- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).\n- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).\n- serial: uartps: Wait for tx_empty in console setup (git-fixes).\n- slimbus: core: check get_addr before removing laddr ida (git-fixes).\n- slimbus: core: do not enter to clock pause mode in core (git-fixes).\n- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).\n- soc: fsl: qbman: Fix return value on success (git-fixes).\n- spi: dw-pci: free previously allocated IRQs if desc-\u003esetup() fails (git-fixes).\n- spi: fsl-espi: Only process interrupts for expected events (git-fixes).\n- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).\n- spi: spi-s3c64xx: Check return values (git-fixes).\n- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).\n- spi: sprd: Release DMA channel also on probe deferral (git-fixes).\n- spi: stm32: Rate-limit the \u0027Communication suspended\u0027 message (git-fixes).\n- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).\n- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).\n- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).\n- staging: octeon: repair \u0027fixed-link\u0027 support (git-fixes).\n- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).\n- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).\n- SUNRPC: Revert 241b1f419f0e (\u0027SUNRPC: Remove xdr_buf_trim()\u0027) (git-fixes).\n- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).\n- taprio: Fix allowing too small intervals (networking-stable-20_09_24).\n- target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).\n- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).\n- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).\n- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).\n- target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch: (bsc#1177090).\n- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).\n- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).\n- target-rbd-support-COMPARE_AND_WRITE.patch: (bsc#1177090).\n- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).\n- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).\n- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).\n- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).\n- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).\n- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).\n- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).\n- tipc: fix uninit skb-\u003edata in tipc_nl_compat_dumpit() (networking-stable-20_08_24).\n- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).\n- tracing: Check return value of __create_val_fields() before using its result (git-fixes).\n- tracing: Save normal string variables (git-fixes).\n- tty: ipwireless: fix error handling (git-fixes).\n- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).\n- uio: free uio id after uio file node is freed (git-fixes).\n- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).\n- Update patches.suse/target-add-rbd-backend.patch: (). (simplify block to byte calculations and use consistent error paths)\n- USB: adutux: fix debugging (git-fixes).\n- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).\n- usb: cdc-acm: fix cooldown mechanism (git-fixes).\n- USB: cdc-acm: handle broken union descriptors (git-fixes).\n- USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).\n- usb: core: Solve race condition in anchor cleanup functions (git-fixes).\n- usb: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).\n- usb: dwc2: Fix parameter type in function pointer prototype (git-fixes).\n- usb: dwc3: core: add phy cleanup for probe error handling (git-fixes).\n- usb: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).\n- usb: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).\n- usb: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).\n- usb: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).\n- usb: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).\n- usb: dwc3: simple: add support for Hikey 970 (git-fixes).\n- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).\n- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).\n- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).\n- usb: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).\n- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).\n- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).\n- usb: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).\n- usblp: fix race between disconnect() and read() (git-fixes).\n- usb: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).\n- usb: ohci: Default to per-port over-current protection (git-fixes).\n- USB: serial: cyberjack: fix write-URB completion race (git-fixes).\n- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).\n- USB: serial: option: add Cellient MPL200 card (git-fixes).\n- USB: serial: option: Add Telit FT980-KS composition (git-fixes).\n- USB: serial: pl2303: add device-id for HP GC device (git-fixes).\n- USB: serial: qcserial: fix altsetting probing (git-fixes).\n- usb: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).\n- usb: xhci-mtk: Fix typo (git-fixes).\n- usb: xhci: omit duplicate actions when suspending a runtime suspended host (git-fixes).\n- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).\n- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).\n- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).\n- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).\n- virtio-net: do not disable guest csum when disable LRO (git-fixes).\n- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).\n- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).\n- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).\n- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).\n- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).\n- watchdog: Use put_device on error (git-fixes).\n- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).\n- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).\n- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).\n- writeback: Avoid skipping inode writeback (bsc#1177755).\n- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).\n- writeback: Protect inode-\u003ei_io_list with inode-\u003ei_lock (bsc#1177755).\n- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).\n- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).\n- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).\n- x86/ioapic: Unbreak check_timer() (bsc#1152489).\n- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).\n- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).\n- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).\n- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).\n- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/events: add a new \u0027late EOI\u0027 evtchn framework (XSA-332 bsc#1177411).\n- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).\n- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).\n- xen/events: block rogue events for some time (XSA-332 bsc#1177411).\n- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).\n- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).\n- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).\n- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).\n- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).\n- xen/gntdev.c: Mark pages as dirty (bsc#1065600).\n- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xfs: complain if anyone tries to create a too-large buffer log item (bsc#1166146).\n- xfs: do not update mtime on COW faults (bsc#1167030).\n- xfs: fix high key handling in the rt allocator\u0027s query_range function (git-fixes).\n- xfs: fix scrub flagging rtinherit even if there is no rt device (git-fixes).\n- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).\n- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).\n- xfs: force the log after remapping a synchronous-writes file (git-fixes).\n- xfs: introduce XFS_MAX_FILEOFF (bsc#1166166).\n- xfs: limit entries returned when counting fsmap records (git-fixes).\n- xfs: remove unused variable \u0027done\u0027 (bsc#1166166).\n- xfs: set xefi_discard when creating a deferred agfl free log intent item (git-fixes).\n- xfs: truncate should remove all blocks, not just to the end of the page cache (bsc#1166166).\n- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n- yam: fix possible memory leak in yam_init_driver (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-2112", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_2112-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:2112-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:2112-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" }, { "category": "self", "summary": "SUSE Bug 1055014", "url": "https://bugzilla.suse.com/1055014" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1061843", "url": "https://bugzilla.suse.com/1061843" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066382", "url": "https://bugzilla.suse.com/1066382" }, { "category": "self", "summary": "SUSE Bug 1077428", "url": "https://bugzilla.suse.com/1077428" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 1134760", "url": "https://bugzilla.suse.com/1134760" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1163592", "url": "https://bugzilla.suse.com/1163592" }, { "category": "self", "summary": "SUSE Bug 1164648", "url": "https://bugzilla.suse.com/1164648" }, { "category": "self", "summary": "SUSE Bug 1165692", "url": "https://bugzilla.suse.com/1165692" }, { "category": "self", "summary": "SUSE Bug 1166146", "url": "https://bugzilla.suse.com/1166146" }, { "category": "self", "summary": "SUSE Bug 1166166", "url": "https://bugzilla.suse.com/1166166" }, { "category": "self", "summary": "SUSE Bug 1167030", "url": "https://bugzilla.suse.com/1167030" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1170415", "url": "https://bugzilla.suse.com/1170415" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174098", "url": "https://bugzilla.suse.com/1174098" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1174969", "url": "https://bugzilla.suse.com/1174969" }, { "category": "self", "summary": "SUSE Bug 1175052", "url": "https://bugzilla.suse.com/1175052" }, { "category": "self", "summary": "SUSE Bug 1175306", "url": "https://bugzilla.suse.com/1175306" }, { "category": "self", "summary": "SUSE Bug 1175599", "url": "https://bugzilla.suse.com/1175599" }, { "category": "self", "summary": "SUSE Bug 1175621", "url": "https://bugzilla.suse.com/1175621" }, { "category": "self", "summary": "SUSE Bug 1175718", "url": "https://bugzilla.suse.com/1175718" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175807", "url": "https://bugzilla.suse.com/1175807" }, { "category": "self", "summary": "SUSE Bug 1175898", "url": "https://bugzilla.suse.com/1175898" }, { "category": "self", "summary": "SUSE Bug 1176019", "url": "https://bugzilla.suse.com/1176019" }, { "category": "self", "summary": "SUSE Bug 1176354", "url": "https://bugzilla.suse.com/1176354" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176588", "url": "https://bugzilla.suse.com/1176588" }, { "category": "self", "summary": "SUSE Bug 1176713", "url": "https://bugzilla.suse.com/1176713" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176979", "url": "https://bugzilla.suse.com/1176979" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177090", "url": "https://bugzilla.suse.com/1177090" }, { "category": "self", "summary": "SUSE Bug 1177109", "url": "https://bugzilla.suse.com/1177109" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177193", "url": "https://bugzilla.suse.com/1177193" }, { "category": "self", "summary": "SUSE Bug 1177194", "url": "https://bugzilla.suse.com/1177194" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177281", "url": "https://bugzilla.suse.com/1177281" }, { "category": "self", "summary": "SUSE Bug 1177283", "url": "https://bugzilla.suse.com/1177283" }, { "category": "self", "summary": "SUSE Bug 1177284", "url": "https://bugzilla.suse.com/1177284" }, { "category": "self", "summary": "SUSE Bug 1177285", "url": "https://bugzilla.suse.com/1177285" }, { "category": "self", "summary": "SUSE Bug 1177286", "url": "https://bugzilla.suse.com/1177286" }, { "category": "self", "summary": "SUSE Bug 1177297", "url": "https://bugzilla.suse.com/1177297" }, { "category": "self", "summary": "SUSE Bug 1177353", "url": "https://bugzilla.suse.com/1177353" }, { "category": "self", "summary": "SUSE Bug 1177384", "url": "https://bugzilla.suse.com/1177384" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177617", "url": "https://bugzilla.suse.com/1177617" }, { "category": "self", "summary": "SUSE Bug 1177681", "url": "https://bugzilla.suse.com/1177681" }, { "category": "self", "summary": "SUSE Bug 1177683", "url": "https://bugzilla.suse.com/1177683" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177694", "url": "https://bugzilla.suse.com/1177694" }, { "category": "self", "summary": "SUSE Bug 1177697", "url": "https://bugzilla.suse.com/1177697" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177726", "url": "https://bugzilla.suse.com/1177726" }, { "category": "self", "summary": "SUSE Bug 1177739", "url": "https://bugzilla.suse.com/1177739" }, { "category": "self", "summary": "SUSE Bug 1177749", "url": "https://bugzilla.suse.com/1177749" }, { "category": "self", "summary": "SUSE Bug 1177750", "url": "https://bugzilla.suse.com/1177750" }, { "category": "self", "summary": "SUSE Bug 1177754", "url": "https://bugzilla.suse.com/1177754" }, { "category": "self", "summary": "SUSE Bug 1177755", "url": "https://bugzilla.suse.com/1177755" }, { "category": "self", "summary": "SUSE Bug 1177765", "url": "https://bugzilla.suse.com/1177765" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177799", "url": "https://bugzilla.suse.com/1177799" }, { "category": "self", "summary": "SUSE Bug 1177801", "url": "https://bugzilla.suse.com/1177801" }, { "category": "self", "summary": "SUSE Bug 1177814", "url": "https://bugzilla.suse.com/1177814" }, { "category": "self", "summary": "SUSE Bug 1177817", "url": "https://bugzilla.suse.com/1177817" }, { "category": "self", "summary": "SUSE Bug 1177854", "url": "https://bugzilla.suse.com/1177854" }, { "category": "self", "summary": "SUSE Bug 1177855", "url": "https://bugzilla.suse.com/1177855" }, { "category": "self", "summary": "SUSE Bug 1177856", "url": "https://bugzilla.suse.com/1177856" }, { "category": "self", "summary": "SUSE Bug 1177861", "url": "https://bugzilla.suse.com/1177861" }, { "category": "self", "summary": "SUSE Bug 1178002", "url": "https://bugzilla.suse.com/1178002" }, { "category": "self", "summary": "SUSE Bug 1178079", "url": "https://bugzilla.suse.com/1178079" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178166", "url": "https://bugzilla.suse.com/1178166" }, { "category": "self", "summary": "SUSE Bug 1178173", "url": "https://bugzilla.suse.com/1178173" }, { "category": "self", "summary": "SUSE Bug 1178175", "url": "https://bugzilla.suse.com/1178175" }, { "category": "self", "summary": "SUSE Bug 1178176", "url": "https://bugzilla.suse.com/1178176" }, { "category": "self", "summary": "SUSE Bug 1178177", "url": "https://bugzilla.suse.com/1178177" }, { "category": "self", "summary": "SUSE Bug 1178183", "url": "https://bugzilla.suse.com/1178183" }, { "category": "self", "summary": "SUSE Bug 1178184", "url": "https://bugzilla.suse.com/1178184" }, { "category": "self", "summary": "SUSE Bug 1178185", "url": "https://bugzilla.suse.com/1178185" }, { "category": "self", "summary": "SUSE Bug 1178186", "url": "https://bugzilla.suse.com/1178186" }, { "category": "self", "summary": "SUSE Bug 1178190", "url": "https://bugzilla.suse.com/1178190" }, { "category": "self", "summary": "SUSE Bug 1178191", "url": "https://bugzilla.suse.com/1178191" }, { "category": "self", "summary": "SUSE Bug 1178246", "url": "https://bugzilla.suse.com/1178246" }, { "category": "self", "summary": "SUSE Bug 1178255", "url": "https://bugzilla.suse.com/1178255" }, { "category": "self", "summary": "SUSE Bug 1178307", "url": "https://bugzilla.suse.com/1178307" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178393", "url": "https://bugzilla.suse.com/1178393" }, { "category": "self", "summary": "SUSE Bug 1178395", "url": "https://bugzilla.suse.com/1178395" }, { "category": "self", "summary": "SUSE Bug 1178461", "url": "https://bugzilla.suse.com/1178461" }, { "category": "self", "summary": "SUSE Bug 1178579", "url": "https://bugzilla.suse.com/1178579" }, { "category": "self", "summary": "SUSE Bug 1178581", "url": "https://bugzilla.suse.com/1178581" }, { "category": "self", "summary": "SUSE Bug 1178584", "url": "https://bugzilla.suse.com/1178584" }, { "category": "self", "summary": "SUSE Bug 1178585", "url": "https://bugzilla.suse.com/1178585" }, { "category": "self", "summary": "SUSE Bug 802154", "url": "https://bugzilla.suse.com/802154" }, { "category": "self", "summary": "SUSE Bug 954532", "url": "https://bugzilla.suse.com/954532" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25704 page", "url": "https://www.suse.com/security/cve/CVE-2020-25704/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-11-29T15:25:26Z", "generator": { "date": "2020-11-29T15:25:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:2112-1", "initial_release_date": "2020-11-29T15:25:26Z", "revision_history": [ { "date": "2020-11-29T15:25:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "product": { "name": "kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "product_id": "kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" }, "product_reference": "kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "important" } ], "title": "CVE-2020-24490" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25704" } ], "notes": [ { "category": "general", "text": "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25704", "url": "https://www.suse.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "SUSE Bug 1178393 for CVE-2020-25704", "url": "https://bugzilla.suse.com/1178393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "moderate" } ], "title": "CVE-2020-25704" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "moderate" } ], "title": "CVE-2020-8694" } ] }
opensuse-su-2020:1698-1
Vulnerability from csaf_opensuse
Published
2020-10-19 16:23
Modified
2020-10-19 16:23
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' aka 'BadChoice' (bsc#1177725).
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code in the Linux kernel could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452 (bnc#1176381).
- CVE-2020-25645: Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1177511).
- CVE-2020-25643: Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (bnc#1177206).
- CVE-2020-25641: A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allowed a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability (bnc#1177121).
The following non-security bugs were fixed:
- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- Input: trackpoint - enable Synaptics trackpoints (git-fixes).
- Move upstreamed intel-vbtn patch into sorted section
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- SUNRPC: Revert 241b1f419f0e ('SUNRPC: Remove xdr_buf_trim()') (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- Update patches.suse/target-add-rbd-backend.patch: (). (simplify block to byte calculations and use consistent error paths)
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- airo: Fix read overflows sending packets (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states are disabled (bnc#1176588).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: dh - check validity of Z before export (bsc#1175718).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: ecdh - check validity of Z before export (bsc#1175718).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- kabi fix for NFS: Fix flexfiles read failover (git-fixes).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kernel-binary.spec.in: Exclude .config.old from kernel-devel - use tar excludes for .kernel-binary.spec.buildenv
- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- lib/mpi: Add mpi_sub_ui() (bsc#1175718).
- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).
- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692).
- mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692).
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi->cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- nfs: Fix security label length not being reset (bsc#1176381).
- nfs: ensure correct writeback errors are returned on close() (git-fixes).
- nfs: nfs_file_write() should check for writeback errors (git-fixes).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- power: supply: max17040: Correct voltage reading (git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).
- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Avoid creating large imbalances at task creation time (bnc#1176588).
- sched/numa: Check numa balancing information only when enabled (bnc#1176588).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc->setup() fails (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).
- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).
- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).
- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).
- target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch: (bsc#1177090).
- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).
- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).
- target-rbd-support-COMPARE_AND_WRITE.patch: (bsc#1177090).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- usb: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xprtrdma: fix incorrect header size calculations (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
Patchnames
openSUSE-2020-1698
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724).\n- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka \u0027BleedingTooth\u0027 aka \u0027BadVibes\u0027 (bsc#1177726).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadChoice\u0027 (bsc#1177725).\n- CVE-2020-25212: A TOCTOU mismatch in the NFS client code in the Linux kernel could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452 (bnc#1176381).\n- CVE-2020-25645: Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1177511).\n- CVE-2020-25643: Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (bnc#1177206).\n- CVE-2020-25641: A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allowed a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability (bnc#1177121).\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix memory leak in v9fs_mount (git-fixes).\n- ACPI: EC: Reference count query handlers under lock (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).\n- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).\n- ASoC: kirkwood: fix IRQ error handling (git-fixes).\n- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).\n- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).\n- Bluetooth: Fix refcount use-after-free issue (git-fixes).\n- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).\n- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).\n- Bluetooth: guard against controllers sending zero\u0027d events (git-fixes).\n- Bluetooth: prefetch channel before killing sock (git-fixes).\n- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).\n- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).\n- Input: trackpoint - enable Synaptics trackpoints (git-fixes).\n- Move upstreamed intel-vbtn patch into sorted section\n- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).\n- NFS: Do not return layout segments that are in use (git-fixes).\n- NFS: Fix flexfiles read failover (git-fixes).\n- NFSv4.2: fix client\u0027s attribute cache management for copy_file_range (git-fixes).\n- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).\n- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).\n- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).\n- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).\n- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).\n- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).\n- SUNRPC: Revert 241b1f419f0e (\u0027SUNRPC: Remove xdr_buf_trim()\u0027) (git-fixes).\n- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).\n- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).\n- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).\n- Update patches.suse/target-add-rbd-backend.patch: (). (simplify block to byte calculations and use consistent error paths)\n- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).\n- airo: Fix read overflows sending packets (git-fixes).\n- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).\n- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).\n- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).\n- ath10k: fix array out-of-bounds access (git-fixes).\n- ath10k: fix memory leak for tpc_stats_final (git-fixes).\n- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).\n- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).\n- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).\n- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).\n- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).\n- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).\n- btrfs: block-group: refactor how we read one block group item (bsc#1176019).\n- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).\n- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).\n- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).\n- btrfs: do not take an extra root ref at allocation time (bsc#1176019).\n- btrfs: drop logs when we\u0027ve aborted a transaction (bsc#1176019).\n- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).\n- btrfs: fix race between page release and a fast fsync (bsc#1177687).\n- btrfs: free block groups after free\u0027ing fs trees (bsc#1176019).\n- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).\n- btrfs: kill the subvol_srcu (bsc#1176019).\n- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).\n- btrfs: make inodes hold a ref on their roots (bsc#1176019).\n- btrfs: make the extent buffer leak check per fs info (bsc#1176019).\n- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).\n- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).\n- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).\n- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).\n- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).\n- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).\n- btrfs: release old extent maps during page release (bsc#1177687).\n- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).\n- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).\n- btrfs: rename member \u0027trimming\u0027 of block group to a more generic name (bsc#1176019).\n- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).\n- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).\n- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).\n- clk/ti/adpll: allocate room for terminating null (git-fixes).\n- clk: samsung: exynos4: mark \u0027chipid\u0027 clock as CLK_IGNORE_UNUSED (git-fixes).\n- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).\n- clk: tegra: Always program PLL_E when enabled (git-fixes).\n- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).\n- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).\n- cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states are disabled (bnc#1176588).\n- create Storage / NVMe subsection\n- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).\n- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).\n- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).\n- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).\n- crypto: dh - check validity of Z before export (bsc#1175718).\n- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).\n- crypto: ecdh - check validity of Z before export (bsc#1175718).\n- crypto: ixp4xx - Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).\n- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).\n- crypto: picoxcell - Fix potential race condition bug (git-fixes).\n- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).\n- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).\n- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).\n- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).\n- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: tegra-apb: Prevent race conditions on channel\u0027s freeing (git-fixes).\n- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).\n- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).\n- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).\n- drm/radeon: revert \u0027Prefer lower feedback dividers\u0027 (bsc#1177384).\n- drop Storage / bsc#1171688 subsection No effect on expanded tree.\n- e1000: Do not perform reset in reset_task if we are already down (git-fixes).\n- ftrace: Move RCU is watching check after recursion check (git-fixes).\n- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).\n- gpio: mockup: fix resource leak in error path (git-fixes).\n- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).\n- gpio: siox: explicitly support only threaded irqs (git-fixes).\n- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).\n- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).\n- hwmon: (applesmc) check status earlier (git-fixes).\n- hwmon: (mlxreg-fan) Fix double \u0027Mellanox\u0027 (git-fixes).\n- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).\n- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).\n- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).\n- i2c: cpm: Fix i2c_ram structure (git-fixes).\n- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).\n- i2c: meson: fix clock setting overwrite (git-fixes).\n- i2c: meson: fixup rate calculation with filter delay (git-fixes).\n- i2c: owl: Clear NACK and BUS error bits (git-fixes).\n- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).\n- i2c: tegra: Restore pinmux on system resume (git-fixes).\n- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).\n- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).\n- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).\n- ima: extend boot_aggregate with kernel measurements (bsc#1177617).\n- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).\n- iommu/amd: Fix potential @entry null deref (bsc#1177283).\n- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).\n- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).\n- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).\n- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).\n- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- kabi fix for NFS: Fix flexfiles read failover (git-fixes).\n- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.\n- kernel-binary.spec.in: Exclude .config.old from kernel-devel - use tar excludes for .kernel-binary.spec.buildenv\n- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.\n- leds: mlxreg: Fix possible buffer overflow (git-fixes).\n- lib/mpi: Add mpi_sub_ui() (bsc#1175718).\n- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).\n- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).\n- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).\n- mac80211: skip mpath lookup also for control port tx (git-fixes).\n- mac802154: tx: fix use-after-free (git-fixes).\n- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).\n- media: Revert \u0027media: exynos4-is: Add missed check for pinctrl_lookup_state()\u0027 (git-fixes).\n- media: camss: Fix a reference count leak (git-fixes).\n- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).\n- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).\n- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).\n- media: omap3isp: Fix memleak in isp_probe (git-fixes).\n- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).\n- media: platform: fcp: Fix a reference count leak (git-fixes).\n- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).\n- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).\n- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).\n- media: rcar-vin: Fix a reference count leak (git-fixes).\n- media: rockchip/rga: Fix a reference count leak (git-fixes).\n- media: s5p-mfc: Fix a reference count leak (git-fixes).\n- media: smiapp: Fix error handling at NVM reading (git-fixes).\n- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).\n- media: stm32-dcmi: Fix a reference count leak (git-fixes).\n- media: tc358743: cleanup tc358743_cec_isr (git-fixes).\n- media: tc358743: initialize variable (git-fixes).\n- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).\n- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).\n- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).\n- media: usbtv: Fix refcounting mixup (git-fixes).\n- media: uvcvideo: Set media controller entity functions (git-fixes).\n- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).\n- media: v4l2-async: Document asd allocation requirements (git-fixes).\n- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).\n- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).\n- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).\n- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692).\n- mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692).\n- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).\n- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).\n- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).\n- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).\n- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).\n- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).\n- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).\n- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).\n- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).\n- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).\n- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).\n- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).\n- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).\n- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).\n- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).\n- mmc: core: Rework wp-gpio handling (git-fixes).\n- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).\n- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).\n- mt76: add missing locking around ampdu action (git-fixes).\n- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).\n- mt76: do not use devm API for led classdev (git-fixes).\n- mt76: fix LED link time failure (git-fixes).\n- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).\n- mtd: cfi_cmdset_0002: do not free cfi-\u003ecfiq in error path of cfi_amdstd_setup() (git-fixes).\n- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).\n- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).\n- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).\n- nfs: Fix security label length not being reset (bsc#1176381).\n- nfs: ensure correct writeback errors are returned on close() (git-fixes).\n- nfs: nfs_file_write() should check for writeback errors (git-fixes).\n- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).\n- nvme-multipath: retry commands for dying queues (bsc#1171688).\n- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).\n- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).\n- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).\n- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).\n- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).\n- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).\n- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).\n- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).\n- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).\n- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).\n- power: supply: max17040: Correct voltage reading (git-fixes).\n- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).\n- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).\n- r8169: fix data corruption issue on RTL8402 (bsc#1174098).\n- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).\n- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).\n- regulator: axp20x: fix LDO2/4 description (git-fixes).\n- regulator: resolve supply after creating regulator (git-fixes).\n- rename Other drivers / Intel IOMMU subsection to IOMMU\n- rtc: ds1374: fix possible race condition (git-fixes).\n- rtc: sa1100: fix possible race condition (git-fixes).\n- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/numa: Avoid creating large imbalances at task creation time (bnc#1176588).\n- sched/numa: Check numa balancing information only when enabled (bnc#1176588).\n- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).\n- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove unneeded variable \u0027rval\u0027 (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).\n- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).\n- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).\n- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).\n- serial: uartps: Wait for tx_empty in console setup (git-fixes).\n- spi: dw-pci: free previously allocated IRQs if desc-\u003esetup() fails (git-fixes).\n- spi: fsl-espi: Only process interrupts for expected events (git-fixes).\n- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).\n- spi: sprd: Release DMA channel also on probe deferral (git-fixes).\n- spi: stm32: Rate-limit the \u0027Communication suspended\u0027 message (git-fixes).\n- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).\n- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).\n- target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).\n- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).\n- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).\n- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).\n- target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch: (bsc#1177090).\n- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).\n- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).\n- target-rbd-support-COMPARE_AND_WRITE.patch: (bsc#1177090).\n- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).\n- usb: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).\n- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).\n- virtio-net: do not disable guest csum when disable LRO (git-fixes).\n- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).\n- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).\n- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).\n- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).\n- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n- yam: fix possible memory leak in yam_init_driver (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-1698", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1698-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:1698-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ODIY42JEXH7RGWFLZMCA4RHYSA2XEWTJ/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:1698-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ODIY42JEXH7RGWFLZMCA4RHYSA2XEWTJ/" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1165692", "url": "https://bugzilla.suse.com/1165692" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174098", "url": "https://bugzilla.suse.com/1174098" }, { "category": "self", "summary": "SUSE Bug 1175599", "url": "https://bugzilla.suse.com/1175599" }, { "category": "self", "summary": "SUSE Bug 1175621", "url": "https://bugzilla.suse.com/1175621" }, { "category": "self", "summary": "SUSE Bug 1175718", "url": "https://bugzilla.suse.com/1175718" }, { "category": "self", "summary": "SUSE Bug 1175807", "url": "https://bugzilla.suse.com/1175807" }, { "category": "self", "summary": "SUSE Bug 1176019", "url": "https://bugzilla.suse.com/1176019" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176588", "url": "https://bugzilla.suse.com/1176588" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176979", "url": "https://bugzilla.suse.com/1176979" }, { "category": "self", "summary": "SUSE Bug 1177090", "url": "https://bugzilla.suse.com/1177090" }, { "category": "self", "summary": "SUSE Bug 1177109", "url": "https://bugzilla.suse.com/1177109" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177193", "url": "https://bugzilla.suse.com/1177193" }, { "category": "self", "summary": "SUSE Bug 1177194", "url": "https://bugzilla.suse.com/1177194" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177283", "url": "https://bugzilla.suse.com/1177283" }, { "category": "self", "summary": "SUSE Bug 1177284", "url": "https://bugzilla.suse.com/1177284" }, { "category": "self", "summary": "SUSE Bug 1177285", "url": "https://bugzilla.suse.com/1177285" }, { "category": "self", "summary": "SUSE Bug 1177286", "url": "https://bugzilla.suse.com/1177286" }, { "category": "self", "summary": "SUSE Bug 1177297", "url": "https://bugzilla.suse.com/1177297" }, { "category": "self", "summary": "SUSE Bug 1177384", "url": "https://bugzilla.suse.com/1177384" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177617", "url": "https://bugzilla.suse.com/1177617" }, { "category": "self", "summary": "SUSE Bug 1177681", "url": "https://bugzilla.suse.com/1177681" }, { "category": "self", "summary": "SUSE Bug 1177683", "url": "https://bugzilla.suse.com/1177683" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177694", "url": "https://bugzilla.suse.com/1177694" }, { "category": "self", "summary": "SUSE Bug 1177697", "url": "https://bugzilla.suse.com/1177697" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177726", "url": "https://bugzilla.suse.com/1177726" }, { "category": "self", "summary": "SUSE Bug 802154", "url": "https://bugzilla.suse.com/802154" }, { "category": "self", "summary": "SUSE Bug 954532", "url": "https://bugzilla.suse.com/954532" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-10-19T16:23:34Z", "generator": { "date": "2020-10-19T16:23:34Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:1698-1", "initial_release_date": "2020-10-19T16:23:34Z", "revision_history": [ { "date": "2020-10-19T16:23:34Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-lp152.47.2.noarch", "product": { "name": "kernel-devel-5.3.18-lp152.47.2.noarch", "product_id": "kernel-devel-5.3.18-lp152.47.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-lp152.47.1.noarch", "product": { "name": "kernel-docs-5.3.18-lp152.47.1.noarch", "product_id": "kernel-docs-5.3.18-lp152.47.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-lp152.47.1.noarch", "product": { "name": "kernel-docs-html-5.3.18-lp152.47.1.noarch", "product_id": "kernel-docs-html-5.3.18-lp152.47.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-lp152.47.2.noarch", "product": { "name": "kernel-macros-5.3.18-lp152.47.2.noarch", "product_id": "kernel-macros-5.3.18-lp152.47.2.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-lp152.47.2.noarch", "product": { "name": "kernel-source-5.3.18-lp152.47.2.noarch", "product_id": "kernel-source-5.3.18-lp152.47.2.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "product_id": "kernel-source-vanilla-5.3.18-lp152.47.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-debug-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-debug-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-debug-devel-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-default-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-default-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-default-devel-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-default-devel-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-kvmsmall-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-obs-build-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-obs-build-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "product_id": "kernel-obs-qa-5.3.18-lp152.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-preempt-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-preempt-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-preempt-devel-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-lp152.47.1.x86_64", "product": { "name": "kernel-syms-5.3.18-lp152.47.1.x86_64", "product_id": "kernel-syms-5.3.18-lp152.47.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-debug-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-default-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-lp152.47.2.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch" }, "product_reference": "kernel-devel-5.3.18-lp152.47.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-lp152.47.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch" }, "product_reference": "kernel-docs-5.3.18-lp152.47.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-5.3.18-lp152.47.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch" }, "product_reference": "kernel-docs-html-5.3.18-lp152.47.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-lp152.47.2.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch" }, "product_reference": "kernel-macros-5.3.18-lp152.47.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.3.18-lp152.47.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64" }, "product_reference": "kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-preempt-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-lp152.47.2.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch" }, "product_reference": "kernel-source-5.3.18-lp152.47.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.3.18-lp152.47.2.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch" }, "product_reference": "kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-lp152.47.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-lp152.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-19T16:23:34Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-19T16:23:34Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-19T16:23:34Z", "details": "important" } ], "title": "CVE-2020-24490" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-19T16:23:34Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-19T16:23:34Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-19T16:23:34Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-19T16:23:34Z", "details": "important" } ], "title": "CVE-2020-25645" } ] }
opensuse-su-2024:11370-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
sca-patterns-sle12-1.0.8-2.2 on GA media
Notes
Title of the patch
sca-patterns-sle12-1.0.8-2.2 on GA media
Description of the patch
These are all security issues fixed in the sca-patterns-sle12-1.0.8-2.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11370
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "sca-patterns-sle12-1.0.8-2.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the sca-patterns-sle12-1.0.8-2.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11370", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11370-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0548 page", "url": "https://www.suse.com/security/cve/CVE-2020-0548/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1472 page", "url": "https://www.suse.com/security/cve/CVE-2020-1472/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" } ], "title": "sca-patterns-sle12-1.0.8-2.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11370-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "sca-patterns-sle12-1.0.8-2.2.aarch64", "product": { "name": "sca-patterns-sle12-1.0.8-2.2.aarch64", "product_id": "sca-patterns-sle12-1.0.8-2.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "sca-patterns-sle12-1.0.8-2.2.ppc64le", "product": { "name": "sca-patterns-sle12-1.0.8-2.2.ppc64le", "product_id": "sca-patterns-sle12-1.0.8-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "sca-patterns-sle12-1.0.8-2.2.s390x", "product": { "name": "sca-patterns-sle12-1.0.8-2.2.s390x", "product_id": "sca-patterns-sle12-1.0.8-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "sca-patterns-sle12-1.0.8-2.2.x86_64", "product": { "name": "sca-patterns-sle12-1.0.8-2.2.x86_64", "product_id": "sca-patterns-sle12-1.0.8-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle12-1.0.8-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64" }, "product_reference": "sca-patterns-sle12-1.0.8-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle12-1.0.8-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le" }, "product_reference": "sca-patterns-sle12-1.0.8-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle12-1.0.8-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x" }, "product_reference": "sca-patterns-sle12-1.0.8-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle12-1.0.8-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" }, "product_reference": "sca-patterns-sle12-1.0.8-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-0548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0548" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0548", "url": "https://www.suse.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0548", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-0548" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-1472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1472" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1472", "url": "https://www.suse.com/security/cve/CVE-2020-1472" }, { "category": "external", "summary": "SUSE Bug 1176579 for CVE-2020-1472", "url": "https://bugzilla.suse.com/1176579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2020-1472" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25705" } ] }
opensuse-su-2024:11371-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
sca-patterns-sle15-1.0.8-2.2 on GA media
Notes
Title of the patch
sca-patterns-sle15-1.0.8-2.2 on GA media
Description of the patch
These are all security issues fixed in the sca-patterns-sle15-1.0.8-2.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11371
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "sca-patterns-sle15-1.0.8-2.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the sca-patterns-sle15-1.0.8-2.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11371", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11371-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0548 page", "url": "https://www.suse.com/security/cve/CVE-2020-0548/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1472 page", "url": "https://www.suse.com/security/cve/CVE-2020-1472/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" } ], "title": "sca-patterns-sle15-1.0.8-2.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11371-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "sca-patterns-sle15-1.0.8-2.2.aarch64", "product": { "name": "sca-patterns-sle15-1.0.8-2.2.aarch64", "product_id": "sca-patterns-sle15-1.0.8-2.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "sca-patterns-sle15-1.0.8-2.2.ppc64le", "product": { "name": "sca-patterns-sle15-1.0.8-2.2.ppc64le", "product_id": "sca-patterns-sle15-1.0.8-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "sca-patterns-sle15-1.0.8-2.2.s390x", "product": { "name": "sca-patterns-sle15-1.0.8-2.2.s390x", "product_id": "sca-patterns-sle15-1.0.8-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "sca-patterns-sle15-1.0.8-2.2.x86_64", "product": { "name": "sca-patterns-sle15-1.0.8-2.2.x86_64", "product_id": "sca-patterns-sle15-1.0.8-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle15-1.0.8-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64" }, "product_reference": "sca-patterns-sle15-1.0.8-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle15-1.0.8-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le" }, "product_reference": "sca-patterns-sle15-1.0.8-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle15-1.0.8-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x" }, "product_reference": "sca-patterns-sle15-1.0.8-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle15-1.0.8-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" }, "product_reference": "sca-patterns-sle15-1.0.8-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-0548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0548" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0548", "url": "https://www.suse.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0548", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-0548" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-1472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1472" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1472", "url": "https://www.suse.com/security/cve/CVE-2020-1472" }, { "category": "external", "summary": "SUSE Bug 1176579 for CVE-2020-1472", "url": "https://bugzilla.suse.com/1176579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2020-1472" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25705" } ] }
opensuse-su-2021:0242-1
Vulnerability from csaf_opensuse
Published
2021-02-05 15:16
Modified
2021-02-05 15:16
Summary
Security update for RT kernel
Notes
Title of the patch
Security update for RT kernel
Description of the patch
This update syncs the RT kernel from the SUSE Linux Enterprise 15-SP2 codestream.
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patchnames
openSUSE-2021-242
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for RT kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update syncs the RT kernel from the SUSE Linux Enterprise 15-SP2 codestream.\n \nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-242", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0242-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:0242-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:0242-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" }, { "category": "self", "summary": "SUSE Bug 1034995", "url": "https://bugzilla.suse.com/1034995" }, { "category": "self", "summary": "SUSE Bug 1040855", "url": "https://bugzilla.suse.com/1040855" }, { "category": "self", "summary": "SUSE Bug 1043347", "url": "https://bugzilla.suse.com/1043347" }, { "category": "self", "summary": "SUSE Bug 1044120", "url": "https://bugzilla.suse.com/1044120" }, { "category": "self", "summary": "SUSE Bug 1044767", "url": "https://bugzilla.suse.com/1044767" }, { "category": "self", "summary": "SUSE Bug 1055014", "url": "https://bugzilla.suse.com/1055014" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1061843", "url": "https://bugzilla.suse.com/1061843" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066382", "url": "https://bugzilla.suse.com/1066382" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1077428", "url": "https://bugzilla.suse.com/1077428" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1094840", "url": "https://bugzilla.suse.com/1094840" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1115431", "url": "https://bugzilla.suse.com/1115431" }, { "category": "self", "summary": "SUSE Bug 1120163", "url": "https://bugzilla.suse.com/1120163" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1134760", "url": "https://bugzilla.suse.com/1134760" }, { "category": "self", "summary": "SUSE Bug 1136666", "url": "https://bugzilla.suse.com/1136666" }, { "category": "self", "summary": "SUSE Bug 1138374", "url": "https://bugzilla.suse.com/1138374" }, { "category": "self", "summary": "SUSE Bug 1139944", "url": "https://bugzilla.suse.com/1139944" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1152148", "url": "https://bugzilla.suse.com/1152148" }, { "category": "self", "summary": "SUSE Bug 1152457", "url": "https://bugzilla.suse.com/1152457" }, { "category": "self", "summary": "SUSE Bug 1152472", "url": "https://bugzilla.suse.com/1152472" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1153274", "url": "https://bugzilla.suse.com/1153274" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1154488", "url": "https://bugzilla.suse.com/1154488" }, { "category": "self", "summary": "SUSE Bug 1154492", "url": "https://bugzilla.suse.com/1154492" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1155518", "url": "https://bugzilla.suse.com/1155518" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1156315", "url": "https://bugzilla.suse.com/1156315" }, { "category": "self", "summary": "SUSE Bug 1156395", "url": "https://bugzilla.suse.com/1156395" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158050", "url": "https://bugzilla.suse.com/1158050" }, { "category": "self", "summary": "SUSE Bug 1158242", "url": "https://bugzilla.suse.com/1158242" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1158748", "url": "https://bugzilla.suse.com/1158748" }, { "category": "self", "summary": "SUSE Bug 1158765", "url": "https://bugzilla.suse.com/1158765" }, { "category": "self", "summary": "SUSE Bug 1158775", "url": "https://bugzilla.suse.com/1158775" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1159781", "url": "https://bugzilla.suse.com/1159781" }, { "category": "self", "summary": "SUSE Bug 1159867", "url": "https://bugzilla.suse.com/1159867" }, { "category": "self", "summary": "SUSE Bug 1159886", "url": "https://bugzilla.suse.com/1159886" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160634", "url": "https://bugzilla.suse.com/1160634" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1161099", "url": "https://bugzilla.suse.com/1161099" }, { "category": "self", "summary": "SUSE Bug 1161495", "url": "https://bugzilla.suse.com/1161495" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1162209", "url": "https://bugzilla.suse.com/1162209" }, { "category": "self", "summary": "SUSE Bug 1162400", "url": "https://bugzilla.suse.com/1162400" }, { "category": "self", "summary": "SUSE Bug 1162702", "url": "https://bugzilla.suse.com/1162702" }, { "category": "self", "summary": "SUSE Bug 1163592", "url": "https://bugzilla.suse.com/1163592" }, { "category": "self", "summary": "SUSE Bug 1163727", "url": "https://bugzilla.suse.com/1163727" }, { "category": "self", "summary": "SUSE Bug 1164648", "url": "https://bugzilla.suse.com/1164648" }, { "category": "self", "summary": "SUSE Bug 1164777", "url": "https://bugzilla.suse.com/1164777" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1165211", "url": "https://bugzilla.suse.com/1165211" }, { "category": "self", "summary": "SUSE Bug 1165455", "url": "https://bugzilla.suse.com/1165455" }, { "category": "self", "summary": "SUSE Bug 1165629", "url": "https://bugzilla.suse.com/1165629" }, { "category": "self", "summary": "SUSE Bug 1165692", "url": "https://bugzilla.suse.com/1165692" }, { "category": "self", "summary": "SUSE Bug 1165933", "url": "https://bugzilla.suse.com/1165933" }, { "category": "self", "summary": "SUSE Bug 1165975", "url": "https://bugzilla.suse.com/1165975" }, { "category": "self", "summary": "SUSE Bug 1166146", "url": "https://bugzilla.suse.com/1166146" }, { "category": "self", "summary": "SUSE Bug 1166166", "url": "https://bugzilla.suse.com/1166166" }, { "category": "self", "summary": "SUSE Bug 1166340", "url": "https://bugzilla.suse.com/1166340" }, { "category": "self", "summary": "SUSE Bug 1166965", "url": "https://bugzilla.suse.com/1166965" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1167030", "url": "https://bugzilla.suse.com/1167030" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1167527", "url": "https://bugzilla.suse.com/1167527" }, { "category": "self", "summary": "SUSE Bug 1167651", "url": "https://bugzilla.suse.com/1167651" }, { "category": "self", "summary": "SUSE Bug 1167657", "url": "https://bugzilla.suse.com/1167657" }, { "category": "self", "summary": "SUSE Bug 1167773", "url": "https://bugzilla.suse.com/1167773" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1168230", "url": "https://bugzilla.suse.com/1168230" }, { "category": "self", "summary": "SUSE Bug 1168461", "url": "https://bugzilla.suse.com/1168461" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1168779", "url": "https://bugzilla.suse.com/1168779" }, { "category": "self", "summary": "SUSE Bug 1168838", "url": "https://bugzilla.suse.com/1168838" }, { "category": "self", "summary": "SUSE Bug 1168952", "url": "https://bugzilla.suse.com/1168952" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169021", "url": "https://bugzilla.suse.com/1169021" }, { "category": "self", "summary": "SUSE Bug 1169094", "url": "https://bugzilla.suse.com/1169094" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169263", "url": "https://bugzilla.suse.com/1169263" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169681", "url": "https://bugzilla.suse.com/1169681" }, { "category": "self", "summary": "SUSE Bug 1169763", "url": "https://bugzilla.suse.com/1169763" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1169790", "url": "https://bugzilla.suse.com/1169790" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170139", "url": "https://bugzilla.suse.com/1170139" }, { "category": "self", "summary": "SUSE Bug 1170232", "url": "https://bugzilla.suse.com/1170232" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170415", "url": "https://bugzilla.suse.com/1170415" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170774", "url": "https://bugzilla.suse.com/1170774" }, { "category": "self", "summary": "SUSE Bug 1170879", "url": "https://bugzilla.suse.com/1170879" }, { "category": "self", "summary": "SUSE Bug 1170891", "url": "https://bugzilla.suse.com/1170891" }, { "category": "self", "summary": "SUSE Bug 1170895", "url": "https://bugzilla.suse.com/1170895" }, { "category": "self", "summary": "SUSE Bug 1171000", "url": "https://bugzilla.suse.com/1171000" }, { "category": "self", "summary": "SUSE Bug 1171068", "url": "https://bugzilla.suse.com/1171068" }, { "category": "self", "summary": "SUSE Bug 1171073", "url": "https://bugzilla.suse.com/1171073" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171117", "url": "https://bugzilla.suse.com/1171117" }, { "category": "self", "summary": "SUSE Bug 1171150", "url": "https://bugzilla.suse.com/1171150" }, { "category": "self", "summary": "SUSE Bug 1171156", "url": "https://bugzilla.suse.com/1171156" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171236", "url": "https://bugzilla.suse.com/1171236" }, { "category": "self", "summary": "SUSE Bug 1171242", "url": "https://bugzilla.suse.com/1171242" }, { "category": "self", "summary": "SUSE Bug 1171246", "url": "https://bugzilla.suse.com/1171246" }, { "category": "self", "summary": "SUSE Bug 1171285", "url": "https://bugzilla.suse.com/1171285" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171374", "url": "https://bugzilla.suse.com/1171374" }, { "category": "self", "summary": "SUSE Bug 1171390", "url": "https://bugzilla.suse.com/1171390" }, { "category": "self", "summary": "SUSE Bug 1171391", "url": "https://bugzilla.suse.com/1171391" }, { "category": "self", "summary": "SUSE Bug 1171392", "url": "https://bugzilla.suse.com/1171392" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171426", "url": "https://bugzilla.suse.com/1171426" }, { "category": "self", "summary": "SUSE Bug 1171507", "url": "https://bugzilla.suse.com/1171507" }, { "category": "self", "summary": "SUSE Bug 1171513", "url": "https://bugzilla.suse.com/1171513" }, { "category": "self", "summary": "SUSE Bug 1171514", "url": "https://bugzilla.suse.com/1171514" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171634", "url": "https://bugzilla.suse.com/1171634" }, { "category": "self", "summary": "SUSE Bug 1171644", "url": "https://bugzilla.suse.com/1171644" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171699", "url": "https://bugzilla.suse.com/1171699" }, { "category": "self", "summary": "SUSE Bug 1171709", "url": "https://bugzilla.suse.com/1171709" }, { "category": "self", "summary": "SUSE Bug 1171730", "url": "https://bugzilla.suse.com/1171730" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171742", "url": "https://bugzilla.suse.com/1171742" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171773", "url": "https://bugzilla.suse.com/1171773" }, { "category": "self", "summary": "SUSE Bug 1171774", "url": "https://bugzilla.suse.com/1171774" }, { "category": "self", "summary": "SUSE Bug 1171775", "url": "https://bugzilla.suse.com/1171775" }, { "category": "self", "summary": "SUSE Bug 1171776", "url": "https://bugzilla.suse.com/1171776" }, { "category": "self", "summary": "SUSE Bug 1171777", "url": "https://bugzilla.suse.com/1171777" }, { "category": "self", "summary": "SUSE Bug 1171778", "url": "https://bugzilla.suse.com/1171778" }, { "category": "self", "summary": "SUSE Bug 1171779", "url": "https://bugzilla.suse.com/1171779" }, { "category": "self", "summary": "SUSE Bug 1171780", "url": "https://bugzilla.suse.com/1171780" }, { "category": "self", "summary": "SUSE Bug 1171781", "url": "https://bugzilla.suse.com/1171781" }, { "category": "self", "summary": "SUSE Bug 1171782", "url": "https://bugzilla.suse.com/1171782" }, { "category": "self", "summary": "SUSE Bug 1171783", "url": "https://bugzilla.suse.com/1171783" }, { "category": "self", "summary": "SUSE Bug 1171784", "url": "https://bugzilla.suse.com/1171784" }, { "category": "self", "summary": "SUSE Bug 1171785", "url": "https://bugzilla.suse.com/1171785" }, { "category": "self", "summary": "SUSE Bug 1171786", "url": "https://bugzilla.suse.com/1171786" }, { "category": "self", "summary": "SUSE Bug 1171787", "url": "https://bugzilla.suse.com/1171787" }, { "category": "self", "summary": "SUSE Bug 1171788", "url": "https://bugzilla.suse.com/1171788" }, { "category": "self", "summary": "SUSE Bug 1171789", "url": "https://bugzilla.suse.com/1171789" }, { "category": "self", "summary": "SUSE Bug 1171790", "url": "https://bugzilla.suse.com/1171790" }, { "category": "self", "summary": "SUSE Bug 1171791", "url": "https://bugzilla.suse.com/1171791" }, { "category": "self", "summary": "SUSE Bug 1171792", "url": "https://bugzilla.suse.com/1171792" }, { "category": "self", "summary": "SUSE Bug 1171793", "url": "https://bugzilla.suse.com/1171793" }, { "category": "self", "summary": "SUSE Bug 1171794", "url": "https://bugzilla.suse.com/1171794" }, { "category": "self", "summary": "SUSE Bug 1171795", "url": "https://bugzilla.suse.com/1171795" }, { "category": "self", "summary": "SUSE Bug 1171796", "url": "https://bugzilla.suse.com/1171796" }, { "category": "self", "summary": "SUSE Bug 1171797", "url": "https://bugzilla.suse.com/1171797" }, { "category": "self", "summary": "SUSE Bug 1171798", "url": "https://bugzilla.suse.com/1171798" }, { "category": "self", "summary": "SUSE Bug 1171799", "url": "https://bugzilla.suse.com/1171799" }, { "category": "self", "summary": "SUSE Bug 1171810", "url": "https://bugzilla.suse.com/1171810" }, { "category": "self", "summary": "SUSE Bug 1171827", "url": "https://bugzilla.suse.com/1171827" }, { "category": "self", "summary": "SUSE Bug 1171828", "url": "https://bugzilla.suse.com/1171828" }, { "category": "self", "summary": "SUSE Bug 1171832", "url": "https://bugzilla.suse.com/1171832" }, { "category": "self", "summary": "SUSE Bug 1171833", "url": "https://bugzilla.suse.com/1171833" }, { "category": "self", "summary": "SUSE Bug 1171834", "url": "https://bugzilla.suse.com/1171834" }, { "category": "self", "summary": "SUSE Bug 1171835", "url": "https://bugzilla.suse.com/1171835" }, { "category": "self", "summary": "SUSE Bug 1171839", "url": "https://bugzilla.suse.com/1171839" }, { "category": "self", "summary": "SUSE Bug 1171840", "url": "https://bugzilla.suse.com/1171840" }, { "category": "self", "summary": "SUSE Bug 1171841", "url": "https://bugzilla.suse.com/1171841" }, { "category": "self", "summary": "SUSE Bug 1171842", "url": "https://bugzilla.suse.com/1171842" }, { "category": "self", "summary": "SUSE Bug 1171843", "url": "https://bugzilla.suse.com/1171843" }, { "category": "self", "summary": "SUSE Bug 1171844", "url": "https://bugzilla.suse.com/1171844" }, { "category": "self", "summary": "SUSE Bug 1171849", "url": "https://bugzilla.suse.com/1171849" }, { "category": "self", "summary": "SUSE Bug 1171857", "url": "https://bugzilla.suse.com/1171857" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1171915", "url": "https://bugzilla.suse.com/1171915" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172046", "url": "https://bugzilla.suse.com/1172046" }, { "category": "self", "summary": "SUSE Bug 1172061", "url": "https://bugzilla.suse.com/1172061" }, { "category": "self", "summary": "SUSE Bug 1172062", "url": "https://bugzilla.suse.com/1172062" }, { "category": "self", "summary": "SUSE Bug 1172063", "url": "https://bugzilla.suse.com/1172063" }, { "category": "self", "summary": "SUSE Bug 1172064", "url": "https://bugzilla.suse.com/1172064" }, { "category": "self", "summary": "SUSE Bug 1172065", "url": "https://bugzilla.suse.com/1172065" }, { "category": "self", "summary": "SUSE Bug 1172066", "url": "https://bugzilla.suse.com/1172066" }, { "category": "self", "summary": "SUSE Bug 1172067", "url": "https://bugzilla.suse.com/1172067" }, { "category": "self", "summary": "SUSE Bug 1172068", "url": "https://bugzilla.suse.com/1172068" }, { "category": "self", "summary": "SUSE Bug 1172069", "url": "https://bugzilla.suse.com/1172069" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172086", "url": "https://bugzilla.suse.com/1172086" }, { "category": "self", "summary": "SUSE Bug 1172095", "url": "https://bugzilla.suse.com/1172095" }, { "category": "self", "summary": "SUSE Bug 1172108", "url": "https://bugzilla.suse.com/1172108" }, { "category": "self", "summary": "SUSE Bug 1172145", "url": "https://bugzilla.suse.com/1172145" }, { "category": "self", "summary": "SUSE Bug 1172169", "url": "https://bugzilla.suse.com/1172169" }, { "category": "self", "summary": "SUSE Bug 1172170", "url": "https://bugzilla.suse.com/1172170" }, { "category": "self", "summary": "SUSE Bug 1172197", "url": "https://bugzilla.suse.com/1172197" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172208", "url": "https://bugzilla.suse.com/1172208" }, { "category": "self", "summary": "SUSE Bug 1172223", "url": "https://bugzilla.suse.com/1172223" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172365", "url": "https://bugzilla.suse.com/1172365" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172374", "url": "https://bugzilla.suse.com/1172374" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172393", "url": "https://bugzilla.suse.com/1172393" }, { "category": "self", "summary": "SUSE Bug 1172394", "url": "https://bugzilla.suse.com/1172394" }, { "category": "self", "summary": "SUSE Bug 1172418", "url": "https://bugzilla.suse.com/1172418" }, { "category": "self", "summary": "SUSE Bug 1172419", "url": "https://bugzilla.suse.com/1172419" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172467", "url": "https://bugzilla.suse.com/1172467" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172543", "url": "https://bugzilla.suse.com/1172543" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172733", "url": "https://bugzilla.suse.com/1172733" }, { "category": "self", "summary": "SUSE Bug 1172739", "url": "https://bugzilla.suse.com/1172739" }, { "category": "self", "summary": "SUSE Bug 1172751", "url": "https://bugzilla.suse.com/1172751" }, { "category": "self", "summary": "SUSE Bug 1172757", "url": "https://bugzilla.suse.com/1172757" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172814", "url": "https://bugzilla.suse.com/1172814" }, { "category": "self", "summary": "SUSE Bug 1172823", "url": "https://bugzilla.suse.com/1172823" }, { "category": "self", "summary": "SUSE Bug 1172841", "url": "https://bugzilla.suse.com/1172841" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172873", "url": "https://bugzilla.suse.com/1172873" }, { "category": "self", "summary": "SUSE Bug 1172938", "url": "https://bugzilla.suse.com/1172938" }, { "category": "self", "summary": "SUSE Bug 1172939", "url": "https://bugzilla.suse.com/1172939" }, { "category": "self", "summary": "SUSE Bug 1172940", "url": "https://bugzilla.suse.com/1172940" }, { "category": "self", "summary": "SUSE Bug 1172956", "url": "https://bugzilla.suse.com/1172956" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1172983", "url": "https://bugzilla.suse.com/1172983" }, { "category": "self", "summary": "SUSE Bug 1172984", "url": "https://bugzilla.suse.com/1172984" }, { "category": "self", "summary": "SUSE Bug 1172985", "url": "https://bugzilla.suse.com/1172985" }, { "category": "self", "summary": "SUSE Bug 1172986", "url": "https://bugzilla.suse.com/1172986" }, { "category": "self", "summary": "SUSE Bug 1172987", "url": "https://bugzilla.suse.com/1172987" }, { "category": "self", "summary": "SUSE Bug 1172988", "url": "https://bugzilla.suse.com/1172988" }, { "category": "self", "summary": "SUSE Bug 1172989", "url": "https://bugzilla.suse.com/1172989" }, { "category": "self", "summary": "SUSE Bug 1172990", "url": "https://bugzilla.suse.com/1172990" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173017", "url": "https://bugzilla.suse.com/1173017" }, { "category": "self", "summary": "SUSE Bug 1173068", "url": "https://bugzilla.suse.com/1173068" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173085", "url": "https://bugzilla.suse.com/1173085" }, { "category": "self", "summary": "SUSE Bug 1173115", "url": "https://bugzilla.suse.com/1173115" }, { "category": "self", "summary": "SUSE Bug 1173139", "url": "https://bugzilla.suse.com/1173139" }, { "category": "self", "summary": "SUSE Bug 1173206", "url": "https://bugzilla.suse.com/1173206" }, { "category": "self", "summary": "SUSE Bug 1173267", "url": "https://bugzilla.suse.com/1173267" }, { "category": "self", "summary": "SUSE Bug 1173271", "url": "https://bugzilla.suse.com/1173271" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173438", "url": "https://bugzilla.suse.com/1173438" }, { "category": "self", "summary": "SUSE Bug 1173461", "url": "https://bugzilla.suse.com/1173461" }, { "category": "self", "summary": "SUSE Bug 1173468", "url": "https://bugzilla.suse.com/1173468" }, { "category": "self", "summary": "SUSE Bug 1173485", "url": "https://bugzilla.suse.com/1173485" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173552", "url": "https://bugzilla.suse.com/1173552" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173625", "url": "https://bugzilla.suse.com/1173625" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173776", "url": "https://bugzilla.suse.com/1173776" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1173813", "url": "https://bugzilla.suse.com/1173813" }, { "category": "self", "summary": "SUSE Bug 1173817", "url": "https://bugzilla.suse.com/1173817" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173822", "url": "https://bugzilla.suse.com/1173822" }, { "category": "self", "summary": "SUSE Bug 1173823", "url": "https://bugzilla.suse.com/1173823" }, { "category": "self", "summary": "SUSE Bug 1173824", "url": "https://bugzilla.suse.com/1173824" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173827", "url": "https://bugzilla.suse.com/1173827" }, { "category": "self", "summary": "SUSE Bug 1173828", "url": "https://bugzilla.suse.com/1173828" }, { "category": "self", "summary": "SUSE Bug 1173830", "url": "https://bugzilla.suse.com/1173830" }, { "category": "self", "summary": "SUSE Bug 1173831", "url": "https://bugzilla.suse.com/1173831" }, { "category": "self", "summary": "SUSE Bug 1173832", "url": "https://bugzilla.suse.com/1173832" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173834", "url": "https://bugzilla.suse.com/1173834" }, { "category": "self", "summary": "SUSE Bug 1173836", "url": "https://bugzilla.suse.com/1173836" }, { "category": "self", "summary": "SUSE Bug 1173837", "url": "https://bugzilla.suse.com/1173837" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173841", "url": "https://bugzilla.suse.com/1173841" }, { "category": "self", "summary": "SUSE Bug 1173843", "url": "https://bugzilla.suse.com/1173843" }, { "category": "self", "summary": "SUSE Bug 1173844", "url": "https://bugzilla.suse.com/1173844" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173847", "url": "https://bugzilla.suse.com/1173847" }, { "category": "self", "summary": "SUSE Bug 1173849", "url": "https://bugzilla.suse.com/1173849" }, { "category": "self", "summary": "SUSE Bug 1173860", "url": "https://bugzilla.suse.com/1173860" }, { "category": "self", "summary": "SUSE Bug 1173894", "url": "https://bugzilla.suse.com/1173894" }, { "category": "self", "summary": "SUSE Bug 1173941", "url": "https://bugzilla.suse.com/1173941" }, { "category": "self", "summary": "SUSE Bug 1173954", "url": "https://bugzilla.suse.com/1173954" }, { "category": "self", "summary": "SUSE Bug 1174002", "url": "https://bugzilla.suse.com/1174002" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174018", "url": "https://bugzilla.suse.com/1174018" }, { "category": "self", "summary": "SUSE Bug 1174026", "url": "https://bugzilla.suse.com/1174026" }, { "category": "self", "summary": "SUSE Bug 1174029", "url": "https://bugzilla.suse.com/1174029" }, { "category": "self", "summary": "SUSE Bug 1174072", "url": "https://bugzilla.suse.com/1174072" }, { "category": "self", "summary": "SUSE Bug 1174098", "url": "https://bugzilla.suse.com/1174098" }, { "category": "self", "summary": "SUSE Bug 1174110", "url": "https://bugzilla.suse.com/1174110" }, { "category": "self", "summary": "SUSE Bug 1174111", "url": "https://bugzilla.suse.com/1174111" }, { "category": "self", "summary": "SUSE Bug 1174116", "url": "https://bugzilla.suse.com/1174116" }, { "category": "self", "summary": "SUSE Bug 1174126", "url": "https://bugzilla.suse.com/1174126" }, { "category": "self", "summary": "SUSE Bug 1174127", "url": "https://bugzilla.suse.com/1174127" }, { "category": "self", "summary": "SUSE Bug 1174128", "url": "https://bugzilla.suse.com/1174128" }, { "category": "self", "summary": "SUSE Bug 1174129", "url": "https://bugzilla.suse.com/1174129" }, { "category": "self", "summary": "SUSE Bug 1174146", "url": "https://bugzilla.suse.com/1174146" }, { "category": "self", "summary": "SUSE Bug 1174185", "url": "https://bugzilla.suse.com/1174185" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174244", "url": "https://bugzilla.suse.com/1174244" }, { "category": "self", "summary": "SUSE Bug 1174263", "url": "https://bugzilla.suse.com/1174263" }, { "category": "self", "summary": "SUSE Bug 1174264", "url": "https://bugzilla.suse.com/1174264" }, { "category": "self", "summary": "SUSE Bug 1174331", "url": "https://bugzilla.suse.com/1174331" }, { "category": "self", "summary": "SUSE Bug 1174332", "url": "https://bugzilla.suse.com/1174332" }, { "category": "self", "summary": "SUSE Bug 1174333", "url": "https://bugzilla.suse.com/1174333" }, { "category": "self", "summary": "SUSE Bug 1174345", "url": "https://bugzilla.suse.com/1174345" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174358", "url": "https://bugzilla.suse.com/1174358" }, { "category": "self", "summary": "SUSE Bug 1174362", "url": "https://bugzilla.suse.com/1174362" }, { "category": "self", "summary": "SUSE Bug 1174387", "url": "https://bugzilla.suse.com/1174387" }, { "category": "self", "summary": "SUSE Bug 1174396", "url": "https://bugzilla.suse.com/1174396" }, { "category": "self", "summary": "SUSE Bug 1174398", "url": "https://bugzilla.suse.com/1174398" }, { "category": "self", "summary": "SUSE Bug 1174407", "url": "https://bugzilla.suse.com/1174407" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174411", "url": "https://bugzilla.suse.com/1174411" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174484", "url": "https://bugzilla.suse.com/1174484" }, { "category": "self", "summary": "SUSE Bug 1174486", "url": "https://bugzilla.suse.com/1174486" }, { "category": "self", "summary": "SUSE Bug 1174513", "url": "https://bugzilla.suse.com/1174513" }, { "category": "self", "summary": "SUSE Bug 1174527", "url": "https://bugzilla.suse.com/1174527" }, { "category": "self", "summary": "SUSE Bug 1174625", "url": "https://bugzilla.suse.com/1174625" }, { "category": "self", "summary": "SUSE Bug 1174627", "url": "https://bugzilla.suse.com/1174627" }, { "category": "self", "summary": "SUSE Bug 1174645", "url": "https://bugzilla.suse.com/1174645" }, { "category": "self", "summary": "SUSE Bug 1174689", "url": "https://bugzilla.suse.com/1174689" }, { "category": "self", "summary": "SUSE Bug 1174699", "url": "https://bugzilla.suse.com/1174699" }, { "category": "self", "summary": "SUSE Bug 1174737", "url": "https://bugzilla.suse.com/1174737" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174762", "url": "https://bugzilla.suse.com/1174762" }, { "category": "self", "summary": "SUSE Bug 1174770", "url": "https://bugzilla.suse.com/1174770" }, { "category": "self", "summary": "SUSE Bug 1174771", "url": "https://bugzilla.suse.com/1174771" }, { "category": "self", "summary": "SUSE Bug 1174777", "url": "https://bugzilla.suse.com/1174777" }, { "category": "self", "summary": "SUSE Bug 1174805", "url": "https://bugzilla.suse.com/1174805" }, { "category": "self", "summary": "SUSE Bug 1174824", "url": "https://bugzilla.suse.com/1174824" }, { "category": "self", "summary": "SUSE Bug 1174825", "url": "https://bugzilla.suse.com/1174825" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1174865", "url": "https://bugzilla.suse.com/1174865" }, { "category": "self", "summary": "SUSE Bug 1174880", "url": "https://bugzilla.suse.com/1174880" }, { "category": "self", "summary": "SUSE Bug 1174897", "url": "https://bugzilla.suse.com/1174897" }, { "category": "self", "summary": "SUSE Bug 1174899", "url": "https://bugzilla.suse.com/1174899" }, { "category": "self", "summary": "SUSE Bug 1174906", "url": "https://bugzilla.suse.com/1174906" }, { "category": "self", "summary": "SUSE Bug 1174969", "url": "https://bugzilla.suse.com/1174969" }, { "category": "self", "summary": "SUSE Bug 1175009", "url": "https://bugzilla.suse.com/1175009" }, { "category": "self", "summary": "SUSE Bug 1175010", "url": "https://bugzilla.suse.com/1175010" }, { "category": "self", "summary": "SUSE Bug 1175011", "url": "https://bugzilla.suse.com/1175011" }, { "category": "self", "summary": "SUSE Bug 1175012", "url": "https://bugzilla.suse.com/1175012" }, { "category": "self", "summary": "SUSE Bug 1175013", "url": "https://bugzilla.suse.com/1175013" }, { "category": "self", "summary": "SUSE Bug 1175014", "url": "https://bugzilla.suse.com/1175014" }, { "category": "self", "summary": "SUSE Bug 1175015", "url": "https://bugzilla.suse.com/1175015" }, { "category": "self", "summary": "SUSE Bug 1175016", "url": "https://bugzilla.suse.com/1175016" }, { "category": "self", "summary": "SUSE Bug 1175017", "url": "https://bugzilla.suse.com/1175017" }, { "category": "self", "summary": "SUSE Bug 1175018", "url": "https://bugzilla.suse.com/1175018" }, { "category": "self", "summary": "SUSE Bug 1175019", "url": "https://bugzilla.suse.com/1175019" }, { "category": "self", "summary": "SUSE Bug 1175020", "url": "https://bugzilla.suse.com/1175020" }, { "category": "self", "summary": "SUSE Bug 1175021", "url": "https://bugzilla.suse.com/1175021" }, { "category": "self", "summary": "SUSE Bug 1175052", "url": "https://bugzilla.suse.com/1175052" }, { "category": "self", "summary": "SUSE Bug 1175079", "url": "https://bugzilla.suse.com/1175079" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175116", "url": "https://bugzilla.suse.com/1175116" }, { "category": "self", "summary": "SUSE Bug 1175128", "url": "https://bugzilla.suse.com/1175128" }, { "category": "self", "summary": "SUSE Bug 1175149", "url": "https://bugzilla.suse.com/1175149" }, { "category": "self", "summary": "SUSE Bug 1175175", "url": "https://bugzilla.suse.com/1175175" }, { "category": "self", "summary": "SUSE Bug 1175176", "url": "https://bugzilla.suse.com/1175176" }, { "category": "self", "summary": "SUSE Bug 1175180", "url": "https://bugzilla.suse.com/1175180" }, { "category": "self", "summary": "SUSE Bug 1175181", "url": "https://bugzilla.suse.com/1175181" }, { "category": "self", "summary": "SUSE Bug 1175182", "url": "https://bugzilla.suse.com/1175182" }, { "category": "self", "summary": "SUSE Bug 1175183", "url": "https://bugzilla.suse.com/1175183" }, { "category": "self", "summary": "SUSE Bug 1175184", "url": "https://bugzilla.suse.com/1175184" }, { "category": "self", "summary": "SUSE Bug 1175185", "url": "https://bugzilla.suse.com/1175185" }, { "category": "self", "summary": "SUSE Bug 1175186", "url": "https://bugzilla.suse.com/1175186" }, { "category": "self", "summary": "SUSE Bug 1175187", "url": "https://bugzilla.suse.com/1175187" }, { "category": "self", "summary": "SUSE Bug 1175188", "url": "https://bugzilla.suse.com/1175188" }, { "category": "self", "summary": "SUSE Bug 1175189", "url": "https://bugzilla.suse.com/1175189" }, { "category": "self", "summary": "SUSE Bug 1175190", "url": "https://bugzilla.suse.com/1175190" }, { "category": "self", "summary": "SUSE Bug 1175191", "url": "https://bugzilla.suse.com/1175191" }, { "category": "self", "summary": "SUSE Bug 1175192", "url": "https://bugzilla.suse.com/1175192" }, { "category": "self", "summary": "SUSE Bug 1175195", "url": "https://bugzilla.suse.com/1175195" }, { "category": "self", "summary": "SUSE Bug 1175199", "url": "https://bugzilla.suse.com/1175199" }, { "category": "self", "summary": "SUSE Bug 1175213", "url": "https://bugzilla.suse.com/1175213" }, { "category": "self", "summary": "SUSE Bug 1175232", "url": "https://bugzilla.suse.com/1175232" }, { "category": "self", "summary": "SUSE Bug 1175263", "url": "https://bugzilla.suse.com/1175263" }, { "category": "self", "summary": "SUSE Bug 1175284", "url": "https://bugzilla.suse.com/1175284" }, { "category": "self", "summary": "SUSE Bug 1175296", "url": "https://bugzilla.suse.com/1175296" }, { "category": "self", "summary": "SUSE Bug 1175306", "url": "https://bugzilla.suse.com/1175306" }, { "category": "self", "summary": "SUSE Bug 1175344", "url": "https://bugzilla.suse.com/1175344" }, { "category": "self", "summary": "SUSE Bug 1175345", "url": "https://bugzilla.suse.com/1175345" }, { "category": "self", "summary": "SUSE Bug 1175346", "url": "https://bugzilla.suse.com/1175346" }, { "category": "self", "summary": "SUSE Bug 1175347", "url": "https://bugzilla.suse.com/1175347" }, { "category": "self", "summary": "SUSE Bug 1175367", "url": "https://bugzilla.suse.com/1175367" }, { "category": "self", "summary": "SUSE Bug 1175377", "url": "https://bugzilla.suse.com/1175377" }, { "category": "self", "summary": "SUSE Bug 1175440", "url": "https://bugzilla.suse.com/1175440" }, { "category": "self", "summary": "SUSE Bug 1175480", "url": "https://bugzilla.suse.com/1175480" }, { "category": "self", "summary": "SUSE Bug 1175493", "url": "https://bugzilla.suse.com/1175493" }, { "category": "self", "summary": "SUSE Bug 1175546", "url": "https://bugzilla.suse.com/1175546" }, { "category": "self", "summary": "SUSE Bug 1175550", "url": "https://bugzilla.suse.com/1175550" }, { "category": "self", "summary": "SUSE Bug 1175599", "url": "https://bugzilla.suse.com/1175599" }, { "category": "self", "summary": "SUSE Bug 1175621", "url": "https://bugzilla.suse.com/1175621" }, { "category": "self", "summary": "SUSE Bug 1175654", "url": "https://bugzilla.suse.com/1175654" }, { "category": "self", "summary": "SUSE Bug 1175667", "url": "https://bugzilla.suse.com/1175667" }, { "category": "self", "summary": "SUSE Bug 1175691", "url": "https://bugzilla.suse.com/1175691" }, { "category": "self", "summary": "SUSE Bug 1175718", "url": "https://bugzilla.suse.com/1175718" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175768", "url": "https://bugzilla.suse.com/1175768" }, { "category": "self", "summary": "SUSE Bug 1175769", "url": "https://bugzilla.suse.com/1175769" }, { "category": "self", "summary": "SUSE Bug 1175770", "url": "https://bugzilla.suse.com/1175770" }, { "category": "self", "summary": "SUSE Bug 1175771", "url": "https://bugzilla.suse.com/1175771" }, { "category": "self", "summary": "SUSE Bug 1175772", "url": "https://bugzilla.suse.com/1175772" }, { "category": "self", "summary": "SUSE Bug 1175774", "url": "https://bugzilla.suse.com/1175774" }, { "category": "self", "summary": "SUSE Bug 1175775", "url": "https://bugzilla.suse.com/1175775" }, { "category": "self", "summary": "SUSE Bug 1175787", "url": "https://bugzilla.suse.com/1175787" }, { "category": "self", "summary": "SUSE Bug 1175807", "url": "https://bugzilla.suse.com/1175807" }, { "category": "self", "summary": "SUSE Bug 1175834", "url": "https://bugzilla.suse.com/1175834" }, { "category": "self", "summary": "SUSE Bug 1175873", "url": "https://bugzilla.suse.com/1175873" }, { "category": "self", "summary": "SUSE Bug 1175882", "url": "https://bugzilla.suse.com/1175882" }, { "category": "self", "summary": "SUSE Bug 1175898", "url": "https://bugzilla.suse.com/1175898" }, { "category": "self", "summary": "SUSE Bug 1175918", "url": "https://bugzilla.suse.com/1175918" }, { "category": "self", "summary": "SUSE Bug 1175952", "url": "https://bugzilla.suse.com/1175952" }, { "category": "self", "summary": "SUSE Bug 1175995", "url": "https://bugzilla.suse.com/1175995" }, { "category": "self", "summary": "SUSE Bug 1175996", "url": "https://bugzilla.suse.com/1175996" }, { "category": "self", "summary": "SUSE Bug 1175997", "url": "https://bugzilla.suse.com/1175997" }, { "category": "self", "summary": "SUSE Bug 1175998", "url": "https://bugzilla.suse.com/1175998" }, { "category": "self", "summary": "SUSE Bug 1175999", "url": "https://bugzilla.suse.com/1175999" }, { "category": "self", "summary": "SUSE Bug 1176000", "url": "https://bugzilla.suse.com/1176000" }, { "category": "self", "summary": "SUSE Bug 1176001", "url": "https://bugzilla.suse.com/1176001" }, { "category": "self", "summary": "SUSE Bug 1176019", "url": "https://bugzilla.suse.com/1176019" }, { "category": "self", "summary": "SUSE Bug 1176022", "url": "https://bugzilla.suse.com/1176022" }, { "category": "self", "summary": "SUSE Bug 1176038", "url": "https://bugzilla.suse.com/1176038" }, { "category": "self", "summary": "SUSE Bug 1176063", "url": "https://bugzilla.suse.com/1176063" }, { "category": "self", "summary": "SUSE Bug 1176069", "url": "https://bugzilla.suse.com/1176069" }, { "category": "self", "summary": "SUSE Bug 1176109", "url": "https://bugzilla.suse.com/1176109" }, { "category": "self", "summary": "SUSE Bug 1176137", "url": "https://bugzilla.suse.com/1176137" }, { "category": "self", "summary": "SUSE Bug 1176180", "url": "https://bugzilla.suse.com/1176180" }, { "category": "self", "summary": "SUSE Bug 1176200", "url": "https://bugzilla.suse.com/1176200" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176236", "url": "https://bugzilla.suse.com/1176236" }, { "category": "self", "summary": "SUSE Bug 1176237", "url": "https://bugzilla.suse.com/1176237" }, { "category": "self", "summary": "SUSE Bug 1176242", "url": "https://bugzilla.suse.com/1176242" }, { "category": "self", "summary": "SUSE Bug 1176354", "url": "https://bugzilla.suse.com/1176354" }, { "category": "self", "summary": "SUSE Bug 1176357", "url": "https://bugzilla.suse.com/1176357" }, { "category": "self", "summary": "SUSE Bug 1176358", "url": "https://bugzilla.suse.com/1176358" }, { "category": "self", "summary": "SUSE Bug 1176359", "url": "https://bugzilla.suse.com/1176359" }, { "category": "self", "summary": "SUSE Bug 1176360", "url": "https://bugzilla.suse.com/1176360" }, { "category": "self", "summary": "SUSE Bug 1176361", "url": "https://bugzilla.suse.com/1176361" }, { "category": "self", "summary": "SUSE Bug 1176362", "url": "https://bugzilla.suse.com/1176362" }, { "category": "self", "summary": "SUSE Bug 1176363", "url": "https://bugzilla.suse.com/1176363" }, { "category": "self", "summary": "SUSE Bug 1176364", "url": "https://bugzilla.suse.com/1176364" }, { "category": "self", "summary": "SUSE Bug 1176365", "url": "https://bugzilla.suse.com/1176365" }, { "category": "self", "summary": "SUSE Bug 1176366", "url": "https://bugzilla.suse.com/1176366" }, { "category": "self", "summary": "SUSE Bug 1176367", "url": "https://bugzilla.suse.com/1176367" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176396", "url": "https://bugzilla.suse.com/1176396" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176449", "url": "https://bugzilla.suse.com/1176449" }, { "category": "self", "summary": "SUSE Bug 1176481", "url": "https://bugzilla.suse.com/1176481" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176486", "url": "https://bugzilla.suse.com/1176486" }, { "category": "self", "summary": "SUSE Bug 1176507", "url": "https://bugzilla.suse.com/1176507" }, { "category": "self", "summary": "SUSE Bug 1176536", "url": "https://bugzilla.suse.com/1176536" }, { "category": "self", "summary": "SUSE Bug 1176537", "url": "https://bugzilla.suse.com/1176537" }, { "category": "self", "summary": "SUSE Bug 1176538", "url": "https://bugzilla.suse.com/1176538" }, { "category": "self", "summary": "SUSE Bug 1176539", "url": "https://bugzilla.suse.com/1176539" }, { "category": "self", "summary": "SUSE Bug 1176540", "url": "https://bugzilla.suse.com/1176540" }, { "category": "self", "summary": "SUSE Bug 1176541", "url": "https://bugzilla.suse.com/1176541" }, { "category": "self", "summary": "SUSE Bug 1176542", "url": "https://bugzilla.suse.com/1176542" }, { "category": "self", "summary": "SUSE Bug 1176543", "url": "https://bugzilla.suse.com/1176543" }, { "category": "self", "summary": "SUSE Bug 1176544", "url": "https://bugzilla.suse.com/1176544" }, { "category": "self", "summary": "SUSE Bug 1176545", "url": "https://bugzilla.suse.com/1176545" }, { "category": "self", "summary": "SUSE Bug 1176546", "url": "https://bugzilla.suse.com/1176546" }, { "category": "self", "summary": "SUSE Bug 1176548", "url": "https://bugzilla.suse.com/1176548" }, { "category": "self", "summary": "SUSE Bug 1176558", "url": "https://bugzilla.suse.com/1176558" }, { "category": "self", "summary": "SUSE Bug 1176559", "url": "https://bugzilla.suse.com/1176559" }, { "category": "self", "summary": "SUSE Bug 1176564", "url": "https://bugzilla.suse.com/1176564" }, { "category": "self", "summary": "SUSE Bug 1176586", "url": "https://bugzilla.suse.com/1176586" }, { "category": "self", "summary": "SUSE Bug 1176587", "url": "https://bugzilla.suse.com/1176587" }, { "category": "self", "summary": "SUSE Bug 1176588", "url": "https://bugzilla.suse.com/1176588" }, { "category": "self", "summary": "SUSE Bug 1176659", "url": "https://bugzilla.suse.com/1176659" }, { "category": "self", "summary": "SUSE Bug 1176698", "url": "https://bugzilla.suse.com/1176698" }, { "category": "self", "summary": "SUSE Bug 1176699", "url": "https://bugzilla.suse.com/1176699" }, { "category": "self", "summary": "SUSE Bug 1176700", "url": "https://bugzilla.suse.com/1176700" }, { "category": "self", "summary": "SUSE Bug 1176713", "url": "https://bugzilla.suse.com/1176713" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176732", "url": "https://bugzilla.suse.com/1176732" }, { "category": "self", "summary": "SUSE Bug 1176763", "url": "https://bugzilla.suse.com/1176763" }, { "category": "self", "summary": "SUSE Bug 1176775", "url": "https://bugzilla.suse.com/1176775" }, { "category": "self", "summary": "SUSE Bug 1176788", "url": "https://bugzilla.suse.com/1176788" }, { "category": "self", "summary": "SUSE Bug 1176789", "url": "https://bugzilla.suse.com/1176789" }, { "category": "self", "summary": "SUSE Bug 1176833", "url": "https://bugzilla.suse.com/1176833" }, { "category": "self", "summary": "SUSE Bug 1176855", "url": "https://bugzilla.suse.com/1176855" }, { "category": "self", "summary": "SUSE Bug 1176869", "url": "https://bugzilla.suse.com/1176869" }, { "category": "self", "summary": "SUSE Bug 1176877", "url": "https://bugzilla.suse.com/1176877" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176925", "url": "https://bugzilla.suse.com/1176925" }, { "category": "self", "summary": "SUSE Bug 1176942", "url": "https://bugzilla.suse.com/1176942" }, { "category": "self", "summary": "SUSE Bug 1176956", "url": "https://bugzilla.suse.com/1176956" }, { "category": "self", "summary": "SUSE Bug 1176962", "url": "https://bugzilla.suse.com/1176962" }, { "category": "self", "summary": "SUSE Bug 1176979", "url": "https://bugzilla.suse.com/1176979" }, { "category": "self", "summary": "SUSE Bug 1176980", "url": "https://bugzilla.suse.com/1176980" }, { "category": "self", "summary": "SUSE Bug 1176983", "url": "https://bugzilla.suse.com/1176983" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177021", "url": "https://bugzilla.suse.com/1177021" }, { "category": "self", "summary": "SUSE Bug 1177030", "url": "https://bugzilla.suse.com/1177030" }, { "category": "self", "summary": "SUSE Bug 1177066", "url": "https://bugzilla.suse.com/1177066" }, { "category": "self", "summary": "SUSE Bug 1177070", "url": "https://bugzilla.suse.com/1177070" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177090", "url": "https://bugzilla.suse.com/1177090" }, { "category": "self", "summary": "SUSE Bug 1177109", "url": "https://bugzilla.suse.com/1177109" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177193", "url": "https://bugzilla.suse.com/1177193" }, { "category": "self", "summary": "SUSE Bug 1177194", "url": "https://bugzilla.suse.com/1177194" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177281", "url": "https://bugzilla.suse.com/1177281" }, { "category": "self", "summary": "SUSE Bug 1177283", "url": "https://bugzilla.suse.com/1177283" }, { "category": "self", "summary": "SUSE Bug 1177284", "url": "https://bugzilla.suse.com/1177284" }, { "category": "self", "summary": "SUSE Bug 1177285", "url": "https://bugzilla.suse.com/1177285" }, { "category": "self", "summary": "SUSE Bug 1177286", "url": "https://bugzilla.suse.com/1177286" }, { "category": "self", "summary": "SUSE Bug 1177297", "url": "https://bugzilla.suse.com/1177297" }, { "category": "self", "summary": "SUSE Bug 1177326", "url": "https://bugzilla.suse.com/1177326" }, { "category": "self", "summary": "SUSE Bug 1177353", "url": "https://bugzilla.suse.com/1177353" }, { "category": "self", "summary": "SUSE Bug 1177384", "url": "https://bugzilla.suse.com/1177384" }, { "category": "self", "summary": "SUSE Bug 1177397", "url": "https://bugzilla.suse.com/1177397" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177500", "url": "https://bugzilla.suse.com/1177500" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177617", "url": "https://bugzilla.suse.com/1177617" }, { "category": "self", "summary": "SUSE Bug 1177666", "url": "https://bugzilla.suse.com/1177666" }, { "category": "self", "summary": "SUSE Bug 1177679", "url": "https://bugzilla.suse.com/1177679" }, { "category": "self", "summary": "SUSE Bug 1177681", "url": "https://bugzilla.suse.com/1177681" }, { "category": "self", "summary": "SUSE Bug 1177683", "url": "https://bugzilla.suse.com/1177683" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177694", "url": "https://bugzilla.suse.com/1177694" }, { "category": "self", "summary": "SUSE Bug 1177697", "url": "https://bugzilla.suse.com/1177697" }, { "category": "self", "summary": "SUSE Bug 1177698", "url": "https://bugzilla.suse.com/1177698" }, { "category": "self", "summary": "SUSE Bug 1177703", "url": "https://bugzilla.suse.com/1177703" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177726", "url": "https://bugzilla.suse.com/1177726" }, { "category": "self", "summary": "SUSE Bug 1177733", "url": "https://bugzilla.suse.com/1177733" }, { "category": "self", "summary": "SUSE Bug 1177739", "url": "https://bugzilla.suse.com/1177739" }, { "category": "self", "summary": "SUSE Bug 1177749", "url": "https://bugzilla.suse.com/1177749" }, { "category": "self", "summary": "SUSE Bug 1177750", "url": "https://bugzilla.suse.com/1177750" }, { "category": "self", "summary": "SUSE Bug 1177754", "url": "https://bugzilla.suse.com/1177754" }, { "category": "self", "summary": "SUSE Bug 1177755", "url": "https://bugzilla.suse.com/1177755" }, { "category": "self", "summary": "SUSE Bug 1177765", "url": "https://bugzilla.suse.com/1177765" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177799", "url": "https://bugzilla.suse.com/1177799" }, { "category": "self", "summary": "SUSE Bug 1177801", "url": "https://bugzilla.suse.com/1177801" }, { "category": "self", "summary": "SUSE Bug 1177814", "url": "https://bugzilla.suse.com/1177814" }, { "category": "self", "summary": "SUSE Bug 1177817", "url": "https://bugzilla.suse.com/1177817" }, { "category": "self", "summary": "SUSE Bug 1177820", "url": "https://bugzilla.suse.com/1177820" }, { "category": "self", "summary": "SUSE Bug 1177854", "url": "https://bugzilla.suse.com/1177854" }, { "category": "self", "summary": "SUSE Bug 1177855", "url": "https://bugzilla.suse.com/1177855" }, { "category": "self", "summary": "SUSE Bug 1177856", "url": "https://bugzilla.suse.com/1177856" }, { "category": "self", "summary": "SUSE Bug 1177861", "url": "https://bugzilla.suse.com/1177861" }, { "category": "self", "summary": "SUSE Bug 1178002", "url": "https://bugzilla.suse.com/1178002" }, { "category": "self", "summary": "SUSE Bug 1178049", "url": "https://bugzilla.suse.com/1178049" }, { "category": "self", "summary": "SUSE Bug 1178079", "url": "https://bugzilla.suse.com/1178079" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178166", "url": "https://bugzilla.suse.com/1178166" }, { "category": "self", "summary": "SUSE Bug 1178173", "url": "https://bugzilla.suse.com/1178173" }, { "category": "self", "summary": "SUSE Bug 1178175", "url": "https://bugzilla.suse.com/1178175" }, { "category": "self", "summary": "SUSE Bug 1178176", "url": "https://bugzilla.suse.com/1178176" }, { "category": "self", "summary": "SUSE Bug 1178177", "url": "https://bugzilla.suse.com/1178177" }, { "category": "self", "summary": "SUSE Bug 1178182", "url": "https://bugzilla.suse.com/1178182" }, { "category": "self", "summary": "SUSE Bug 1178183", "url": "https://bugzilla.suse.com/1178183" }, { "category": "self", "summary": "SUSE Bug 1178184", "url": "https://bugzilla.suse.com/1178184" }, { "category": "self", "summary": "SUSE Bug 1178185", "url": "https://bugzilla.suse.com/1178185" }, { "category": "self", "summary": "SUSE Bug 1178186", "url": "https://bugzilla.suse.com/1178186" }, { "category": "self", "summary": "SUSE Bug 1178190", "url": "https://bugzilla.suse.com/1178190" }, { "category": "self", "summary": "SUSE Bug 1178191", "url": "https://bugzilla.suse.com/1178191" }, { "category": "self", "summary": "SUSE Bug 1178203", "url": "https://bugzilla.suse.com/1178203" }, { "category": "self", "summary": "SUSE Bug 1178227", "url": "https://bugzilla.suse.com/1178227" }, { "category": "self", "summary": "SUSE Bug 1178246", "url": "https://bugzilla.suse.com/1178246" }, { "category": "self", "summary": "SUSE Bug 1178255", "url": "https://bugzilla.suse.com/1178255" }, { "category": "self", "summary": "SUSE Bug 1178270", "url": "https://bugzilla.suse.com/1178270" }, { "category": "self", "summary": "SUSE Bug 1178286", "url": "https://bugzilla.suse.com/1178286" }, { "category": "self", "summary": "SUSE Bug 1178307", "url": "https://bugzilla.suse.com/1178307" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178393", "url": "https://bugzilla.suse.com/1178393" }, { "category": "self", "summary": "SUSE Bug 1178395", "url": "https://bugzilla.suse.com/1178395" }, { "category": "self", "summary": "SUSE Bug 1178401", "url": "https://bugzilla.suse.com/1178401" }, { "category": "self", "summary": "SUSE Bug 1178426", "url": "https://bugzilla.suse.com/1178426" }, { "category": "self", "summary": "SUSE Bug 1178461", "url": "https://bugzilla.suse.com/1178461" }, { "category": "self", "summary": "SUSE Bug 1178579", "url": "https://bugzilla.suse.com/1178579" }, { "category": "self", "summary": "SUSE Bug 1178581", "url": "https://bugzilla.suse.com/1178581" }, { "category": "self", "summary": "SUSE Bug 1178584", "url": "https://bugzilla.suse.com/1178584" }, { "category": "self", "summary": "SUSE Bug 1178585", "url": "https://bugzilla.suse.com/1178585" }, { "category": "self", "summary": "SUSE Bug 1178589", "url": "https://bugzilla.suse.com/1178589" }, { "category": "self", "summary": "SUSE Bug 1178590", "url": "https://bugzilla.suse.com/1178590" }, { "category": "self", "summary": "SUSE Bug 1178612", "url": "https://bugzilla.suse.com/1178612" }, { "category": "self", "summary": "SUSE Bug 1178634", "url": "https://bugzilla.suse.com/1178634" }, { "category": "self", "summary": "SUSE Bug 1178635", "url": "https://bugzilla.suse.com/1178635" }, { "category": "self", "summary": "SUSE Bug 1178653", "url": "https://bugzilla.suse.com/1178653" }, { "category": "self", "summary": "SUSE Bug 1178659", "url": "https://bugzilla.suse.com/1178659" }, { "category": "self", "summary": "SUSE Bug 1178660", "url": "https://bugzilla.suse.com/1178660" }, { "category": "self", "summary": "SUSE Bug 1178661", "url": "https://bugzilla.suse.com/1178661" }, { "category": "self", "summary": "SUSE Bug 1178669", "url": "https://bugzilla.suse.com/1178669" }, { "category": "self", "summary": "SUSE Bug 1178686", "url": "https://bugzilla.suse.com/1178686" }, { "category": "self", "summary": "SUSE Bug 1178740", "url": "https://bugzilla.suse.com/1178740" }, { "category": "self", "summary": "SUSE Bug 1178755", "url": "https://bugzilla.suse.com/1178755" }, { "category": "self", "summary": "SUSE Bug 1178756", "url": "https://bugzilla.suse.com/1178756" }, { "category": "self", "summary": "SUSE Bug 1178762", "url": "https://bugzilla.suse.com/1178762" }, { "category": "self", "summary": "SUSE Bug 1178780", "url": "https://bugzilla.suse.com/1178780" }, { "category": "self", "summary": "SUSE Bug 1178838", "url": "https://bugzilla.suse.com/1178838" }, { "category": "self", "summary": "SUSE Bug 1178853", "url": "https://bugzilla.suse.com/1178853" }, { "category": "self", "summary": "SUSE Bug 1178886", "url": "https://bugzilla.suse.com/1178886" }, { "category": "self", "summary": "SUSE Bug 1179001", "url": "https://bugzilla.suse.com/1179001" }, { "category": "self", "summary": "SUSE Bug 1179012", "url": "https://bugzilla.suse.com/1179012" }, { "category": "self", "summary": "SUSE Bug 1179014", "url": "https://bugzilla.suse.com/1179014" }, { "category": "self", "summary": "SUSE Bug 1179015", "url": "https://bugzilla.suse.com/1179015" }, { "category": "self", "summary": "SUSE Bug 1179045", "url": "https://bugzilla.suse.com/1179045" }, { "category": "self", "summary": "SUSE Bug 1179076", "url": "https://bugzilla.suse.com/1179076" }, { "category": "self", "summary": "SUSE Bug 1179082", "url": "https://bugzilla.suse.com/1179082" }, { "category": "self", "summary": "SUSE Bug 1179107", "url": "https://bugzilla.suse.com/1179107" }, { "category": "self", "summary": "SUSE Bug 1179140", "url": "https://bugzilla.suse.com/1179140" }, { "category": "self", "summary": "SUSE Bug 1179141", "url": "https://bugzilla.suse.com/1179141" }, { "category": "self", "summary": "SUSE Bug 1179160", "url": "https://bugzilla.suse.com/1179160" }, { "category": "self", "summary": "SUSE Bug 1179201", "url": "https://bugzilla.suse.com/1179201" }, { "category": "self", "summary": "SUSE Bug 1179204", "url": "https://bugzilla.suse.com/1179204" }, { "category": "self", "summary": "SUSE Bug 1179211", "url": "https://bugzilla.suse.com/1179211" }, { "category": "self", "summary": "SUSE Bug 1179217", "url": "https://bugzilla.suse.com/1179217" }, { "category": "self", "summary": "SUSE Bug 1179419", "url": "https://bugzilla.suse.com/1179419" }, { "category": "self", "summary": "SUSE Bug 1179424", "url": "https://bugzilla.suse.com/1179424" }, { "category": "self", "summary": "SUSE Bug 1179425", "url": "https://bugzilla.suse.com/1179425" }, { "category": "self", "summary": "SUSE Bug 1179426", "url": "https://bugzilla.suse.com/1179426" }, { "category": "self", "summary": "SUSE Bug 1179427", "url": "https://bugzilla.suse.com/1179427" }, { "category": "self", "summary": "SUSE Bug 1179429", "url": "https://bugzilla.suse.com/1179429" }, { "category": "self", "summary": "SUSE Bug 1179432", "url": "https://bugzilla.suse.com/1179432" }, { "category": "self", "summary": "SUSE Bug 1179434", "url": "https://bugzilla.suse.com/1179434" }, { "category": "self", "summary": "SUSE Bug 1179435", "url": "https://bugzilla.suse.com/1179435" }, { "category": "self", "summary": "SUSE Bug 1179442", "url": "https://bugzilla.suse.com/1179442" }, { "category": "self", "summary": "SUSE Bug 1179519", "url": "https://bugzilla.suse.com/1179519" }, { "category": "self", "summary": "SUSE Bug 1179550", "url": "https://bugzilla.suse.com/1179550" }, { "category": "self", "summary": "SUSE Bug 1179575", "url": "https://bugzilla.suse.com/1179575" }, { "category": "self", "summary": "SUSE Bug 1179578", "url": "https://bugzilla.suse.com/1179578" }, { "category": "self", "summary": "SUSE Bug 1179601", "url": "https://bugzilla.suse.com/1179601" }, { "category": "self", "summary": "SUSE Bug 1179604", "url": "https://bugzilla.suse.com/1179604" }, { "category": "self", "summary": "SUSE Bug 1179639", "url": "https://bugzilla.suse.com/1179639" }, { "category": "self", "summary": "SUSE Bug 1179652", "url": "https://bugzilla.suse.com/1179652" }, { "category": "self", "summary": "SUSE Bug 1179656", "url": "https://bugzilla.suse.com/1179656" }, { "category": "self", "summary": "SUSE Bug 1179670", "url": "https://bugzilla.suse.com/1179670" }, { "category": "self", "summary": "SUSE Bug 1179671", "url": "https://bugzilla.suse.com/1179671" }, { "category": "self", "summary": "SUSE Bug 1179672", "url": "https://bugzilla.suse.com/1179672" }, { "category": "self", "summary": "SUSE Bug 1179673", "url": "https://bugzilla.suse.com/1179673" }, { "category": "self", "summary": "SUSE Bug 1179675", "url": "https://bugzilla.suse.com/1179675" }, { "category": "self", "summary": "SUSE Bug 1179676", "url": "https://bugzilla.suse.com/1179676" }, { "category": "self", "summary": "SUSE Bug 1179677", "url": "https://bugzilla.suse.com/1179677" }, { "category": "self", "summary": "SUSE Bug 1179678", "url": "https://bugzilla.suse.com/1179678" }, { "category": "self", "summary": "SUSE Bug 1179679", "url": "https://bugzilla.suse.com/1179679" }, { "category": "self", "summary": "SUSE Bug 1179680", "url": "https://bugzilla.suse.com/1179680" }, { "category": "self", "summary": "SUSE Bug 1179681", "url": "https://bugzilla.suse.com/1179681" }, { "category": "self", "summary": "SUSE Bug 1179682", "url": "https://bugzilla.suse.com/1179682" }, { "category": "self", "summary": "SUSE Bug 1179683", "url": "https://bugzilla.suse.com/1179683" }, { "category": "self", "summary": "SUSE Bug 1179684", "url": "https://bugzilla.suse.com/1179684" }, { "category": "self", "summary": "SUSE Bug 1179685", "url": "https://bugzilla.suse.com/1179685" }, { "category": "self", "summary": "SUSE Bug 1179687", "url": "https://bugzilla.suse.com/1179687" }, { "category": "self", "summary": "SUSE Bug 1179688", "url": "https://bugzilla.suse.com/1179688" }, { "category": "self", "summary": "SUSE Bug 1179689", "url": "https://bugzilla.suse.com/1179689" }, { "category": "self", "summary": "SUSE Bug 1179690", "url": "https://bugzilla.suse.com/1179690" }, { "category": "self", "summary": "SUSE Bug 1179703", "url": "https://bugzilla.suse.com/1179703" }, { "category": "self", "summary": "SUSE Bug 1179704", "url": "https://bugzilla.suse.com/1179704" }, { "category": "self", "summary": "SUSE Bug 1179707", "url": "https://bugzilla.suse.com/1179707" }, { "category": "self", "summary": "SUSE Bug 1179709", "url": "https://bugzilla.suse.com/1179709" }, { "category": "self", "summary": "SUSE Bug 1179710", "url": "https://bugzilla.suse.com/1179710" }, { "category": "self", "summary": "SUSE Bug 1179711", "url": "https://bugzilla.suse.com/1179711" }, { "category": "self", "summary": "SUSE Bug 1179712", "url": "https://bugzilla.suse.com/1179712" }, { "category": "self", "summary": "SUSE Bug 1179713", "url": "https://bugzilla.suse.com/1179713" }, { "category": "self", "summary": "SUSE Bug 1179714", "url": "https://bugzilla.suse.com/1179714" }, { "category": "self", "summary": "SUSE Bug 1179715", "url": "https://bugzilla.suse.com/1179715" }, { "category": "self", "summary": "SUSE Bug 1179716", "url": "https://bugzilla.suse.com/1179716" }, { "category": "self", "summary": "SUSE Bug 1179745", "url": "https://bugzilla.suse.com/1179745" }, { "category": "self", "summary": "SUSE Bug 1179763", "url": "https://bugzilla.suse.com/1179763" }, { "category": "self", "summary": "SUSE Bug 1179887", "url": "https://bugzilla.suse.com/1179887" }, { "category": "self", "summary": "SUSE Bug 1179888", "url": "https://bugzilla.suse.com/1179888" }, { "category": "self", "summary": "SUSE Bug 1179892", "url": "https://bugzilla.suse.com/1179892" }, { "category": "self", "summary": "SUSE Bug 1179896", "url": "https://bugzilla.suse.com/1179896" }, { "category": "self", "summary": "SUSE Bug 1179960", "url": "https://bugzilla.suse.com/1179960" }, { "category": "self", "summary": "SUSE Bug 1179963", "url": "https://bugzilla.suse.com/1179963" }, { "category": "self", "summary": "SUSE Bug 1180027", "url": "https://bugzilla.suse.com/1180027" }, { "category": "self", "summary": "SUSE Bug 1180029", "url": "https://bugzilla.suse.com/1180029" }, { "category": "self", "summary": "SUSE Bug 1180031", "url": "https://bugzilla.suse.com/1180031" }, { "category": "self", "summary": "SUSE Bug 1180052", "url": "https://bugzilla.suse.com/1180052" }, { "category": "self", "summary": "SUSE Bug 1180056", "url": "https://bugzilla.suse.com/1180056" }, { "category": "self", "summary": "SUSE Bug 1180086", "url": "https://bugzilla.suse.com/1180086" }, { "category": "self", "summary": "SUSE Bug 1180117", "url": "https://bugzilla.suse.com/1180117" }, { "category": "self", "summary": "SUSE Bug 1180258", "url": "https://bugzilla.suse.com/1180258" }, { "category": "self", "summary": "SUSE Bug 1180261", "url": "https://bugzilla.suse.com/1180261" }, { "category": "self", "summary": "SUSE Bug 1180349", "url": "https://bugzilla.suse.com/1180349" }, { "category": "self", "summary": "SUSE Bug 1180506", "url": "https://bugzilla.suse.com/1180506" }, { "category": "self", "summary": "SUSE Bug 1180541", "url": "https://bugzilla.suse.com/1180541" }, { "category": "self", "summary": "SUSE Bug 1180559", "url": "https://bugzilla.suse.com/1180559" }, { "category": "self", "summary": "SUSE Bug 1180566", "url": "https://bugzilla.suse.com/1180566" }, { "category": "self", "summary": "SUSE Bug 173030", "url": "https://bugzilla.suse.com/173030" }, { "category": "self", "summary": "SUSE Bug 744692", "url": "https://bugzilla.suse.com/744692" }, { "category": "self", "summary": "SUSE Bug 789311", "url": "https://bugzilla.suse.com/789311" }, { "category": "self", "summary": "SUSE Bug 954532", "url": "https://bugzilla.suse.com/954532" }, { "category": "self", "summary": "SUSE Bug 995541", "url": "https://bugzilla.suse.com/995541" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0110 page", "url": "https://www.suse.com/security/cve/CVE-2020-0110/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0444 page", "url": "https://www.suse.com/security/cve/CVE-2020-0444/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0465 page", "url": "https://www.suse.com/security/cve/CVE-2020-0465/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0466 page", "url": "https://www.suse.com/security/cve/CVE-2020-0466/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14356 page", "url": "https://www.suse.com/security/cve/CVE-2020-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14385 page", "url": "https://www.suse.com/security/cve/CVE-2020-14385/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15436 page", "url": "https://www.suse.com/security/cve/CVE-2020-15436/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15437 page", "url": "https://www.suse.com/security/cve/CVE-2020-15437/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25669 page", "url": "https://www.suse.com/security/cve/CVE-2020-25669/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25704 page", "url": "https://www.suse.com/security/cve/CVE-2020-25704/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27068 page", "url": "https://www.suse.com/security/cve/CVE-2020-27068/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27777 page", "url": "https://www.suse.com/security/cve/CVE-2020-27777/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27786 page", "url": "https://www.suse.com/security/cve/CVE-2020-27786/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27825 page", "url": "https://www.suse.com/security/cve/CVE-2020-27825/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27830 page", "url": "https://www.suse.com/security/cve/CVE-2020-27830/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28915 page", "url": "https://www.suse.com/security/cve/CVE-2020-28915/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28941 page", "url": "https://www.suse.com/security/cve/CVE-2020-28941/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28974 page", "url": "https://www.suse.com/security/cve/CVE-2020-28974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29369 page", "url": "https://www.suse.com/security/cve/CVE-2020-29369/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29370 page", "url": "https://www.suse.com/security/cve/CVE-2020-29370/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29371 page", "url": "https://www.suse.com/security/cve/CVE-2020-29371/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29373 page", "url": "https://www.suse.com/security/cve/CVE-2020-29373/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36158 page", "url": "https://www.suse.com/security/cve/CVE-2020-36158/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-4788 page", "url": "https://www.suse.com/security/cve/CVE-2020-4788/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" } ], "title": "Security update for RT kernel", "tracking": { "current_release_date": "2021-02-05T15:16:03Z", "generator": { "date": "2021-02-05T15:16:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:0242-1", "initial_release_date": "2021-02-05T15:16:03Z", "revision_history": [ { "date": "2021-02-05T15:16:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "product_id": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "product_id": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch" }, "product_reference": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2020-0110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0110" } ], "notes": [ { "category": "general", "text": "In psi_write of psi.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-148159562References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0110", "url": "https://www.suse.com/security/cve/CVE-2020-0110" }, { "category": "external", "summary": "SUSE Bug 1171374 for CVE-2020-0110", "url": "https://bugzilla.suse.com/1171374" }, { "category": "external", "summary": "SUSE Bug 1174874 for CVE-2020-0110", "url": "https://bugzilla.suse.com/1174874" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0110" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-0444", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0444" } ], "notes": [ { "category": "general", "text": "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0444", "url": "https://www.suse.com/security/cve/CVE-2020-0444" }, { "category": "external", "summary": "SUSE Bug 1180027 for CVE-2020-0444", "url": "https://bugzilla.suse.com/1180027" }, { "category": "external", "summary": "SUSE Bug 1180028 for CVE-2020-0444", "url": "https://bugzilla.suse.com/1180028" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0444" }, { "cve": "CVE-2020-0465", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0465" } ], "notes": [ { "category": "general", "text": "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0465", "url": "https://www.suse.com/security/cve/CVE-2020-0465" }, { "category": "external", "summary": "SUSE Bug 1180029 for CVE-2020-0465", "url": "https://bugzilla.suse.com/1180029" }, { "category": "external", "summary": "SUSE Bug 1180030 for CVE-2020-0465", "url": "https://bugzilla.suse.com/1180030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0465" }, { "cve": "CVE-2020-0466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0466" } ], "notes": [ { "category": "general", "text": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0466", "url": "https://www.suse.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "SUSE Bug 1180031 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1180031" }, { "category": "external", "summary": "SUSE Bug 1180032 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1180032" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0466" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-13143" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14356" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14356", "url": "https://www.suse.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "SUSE Bug 1175213 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1175213" }, { "category": "external", "summary": "SUSE Bug 1176392 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1176392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14356" }, { "cve": "CVE-2020-14385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14385" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14385", "url": "https://www.suse.com/security/cve/CVE-2020-14385" }, { "category": "external", "summary": "SUSE Bug 1176137 for CVE-2020-14385", "url": "https://bugzilla.suse.com/1176137" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14385" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15436" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15436", "url": "https://www.suse.com/security/cve/CVE-2020-15436" }, { "category": "external", "summary": "SUSE Bug 1179141 for CVE-2020-15436", "url": "https://bugzilla.suse.com/1179141" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-15436" }, { "cve": "CVE-2020-15437", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15437" } ], "notes": [ { "category": "general", "text": "The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p-\u003eserial_in pointer which uninitialized.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15437", "url": "https://www.suse.com/security/cve/CVE-2020-15437" }, { "category": "external", "summary": "SUSE Bug 1179140 for CVE-2020-15437", "url": "https://bugzilla.suse.com/1179140" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-15437" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-15780" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-16166" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-1749" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-24490" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25669" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25669", "url": "https://www.suse.com/security/cve/CVE-2020-25669" }, { "category": "external", "summary": "SUSE Bug 1178182 for CVE-2020-25669", "url": "https://bugzilla.suse.com/1178182" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25669" }, { "cve": "CVE-2020-25704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25704" } ], "notes": [ { "category": "general", "text": "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25704", "url": "https://www.suse.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "SUSE Bug 1178393 for CVE-2020-25704", "url": "https://bugzilla.suse.com/1178393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25704" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-26088" }, { "cve": "CVE-2020-27068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27068" } ], "notes": [ { "category": "general", "text": "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27068", "url": "https://www.suse.com/security/cve/CVE-2020-27068" }, { "category": "external", "summary": "SUSE Bug 1180086 for CVE-2020-27068", "url": "https://bugzilla.suse.com/1180086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-27068" }, { "cve": "CVE-2020-27777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27777" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27777", "url": "https://www.suse.com/security/cve/CVE-2020-27777" }, { "category": "external", "summary": "SUSE Bug 1179107 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1179107" }, { "category": "external", "summary": "SUSE Bug 1179419 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1179419" }, { "category": "external", "summary": "SUSE Bug 1200343 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1200343" }, { "category": "external", "summary": "SUSE Bug 1220060 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1220060" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-27777" }, { "cve": "CVE-2020-27786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27786" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27786", "url": "https://www.suse.com/security/cve/CVE-2020-27786" }, { "category": "external", "summary": "SUSE Bug 1179601 for CVE-2020-27786", "url": "https://bugzilla.suse.com/1179601" }, { "category": "external", "summary": "SUSE Bug 1179616 for CVE-2020-27786", "url": "https://bugzilla.suse.com/1179616" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-27786" }, { "cve": "CVE-2020-27825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27825" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27825", "url": "https://www.suse.com/security/cve/CVE-2020-27825" }, { "category": "external", "summary": "SUSE Bug 1179960 for CVE-2020-27825", "url": "https://bugzilla.suse.com/1179960" }, { "category": "external", "summary": "SUSE Bug 1179961 for CVE-2020-27825", "url": "https://bugzilla.suse.com/1179961" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-27825" }, { "cve": "CVE-2020-27830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27830" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27830", "url": "https://www.suse.com/security/cve/CVE-2020-27830" }, { "category": "external", "summary": "SUSE Bug 1179656 for CVE-2020-27830", "url": "https://bugzilla.suse.com/1179656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-27830" }, { "cve": "CVE-2020-28915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28915" } ], "notes": [ { "category": "general", "text": "A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28915", "url": "https://www.suse.com/security/cve/CVE-2020-28915" }, { "category": "external", "summary": "SUSE Bug 1178886 for CVE-2020-28915", "url": "https://bugzilla.suse.com/1178886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-28915" }, { "cve": "CVE-2020-28941", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28941" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28941", "url": "https://www.suse.com/security/cve/CVE-2020-28941" }, { "category": "external", "summary": "SUSE Bug 1178740 for CVE-2020-28941", "url": "https://bugzilla.suse.com/1178740" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-28941" }, { "cve": "CVE-2020-28974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28974" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28974", "url": "https://www.suse.com/security/cve/CVE-2020-28974" }, { "category": "external", "summary": "SUSE Bug 1178589 for CVE-2020-28974", "url": "https://bugzilla.suse.com/1178589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-28974" }, { "cve": "CVE-2020-29369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29369" } ], "notes": [ { "category": "general", "text": "An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29369", "url": "https://www.suse.com/security/cve/CVE-2020-29369" }, { "category": "external", "summary": "SUSE Bug 1173504 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1173504" }, { "category": "external", "summary": "SUSE Bug 1179432 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1179432" }, { "category": "external", "summary": "SUSE Bug 1179646 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1179646" }, { "category": "external", "summary": "SUSE Bug 1182109 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1182109" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29369" }, { "cve": "CVE-2020-29370", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29370" } ], "notes": [ { "category": "general", "text": "An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29370", "url": "https://www.suse.com/security/cve/CVE-2020-29370" }, { "category": "external", "summary": "SUSE Bug 1179435 for CVE-2020-29370", "url": "https://bugzilla.suse.com/1179435" }, { "category": "external", "summary": "SUSE Bug 1179648 for CVE-2020-29370", "url": "https://bugzilla.suse.com/1179648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29370" }, { "cve": "CVE-2020-29371", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29371" } ], "notes": [ { "category": "general", "text": "An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29371", "url": "https://www.suse.com/security/cve/CVE-2020-29371" }, { "category": "external", "summary": "SUSE Bug 1179429 for CVE-2020-29371", "url": "https://bugzilla.suse.com/1179429" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-29371" }, { "cve": "CVE-2020-29373", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29373" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29373", "url": "https://www.suse.com/security/cve/CVE-2020-29373" }, { "category": "external", "summary": "SUSE Bug 1179434 for CVE-2020-29373", "url": "https://bugzilla.suse.com/1179434" }, { "category": "external", "summary": "SUSE Bug 1179779 for CVE-2020-29373", "url": "https://bugzilla.suse.com/1179779" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29373" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-36158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36158" } ], "notes": [ { "category": "general", "text": "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36158", "url": "https://www.suse.com/security/cve/CVE-2020-36158" }, { "category": "external", "summary": "SUSE Bug 1180559 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180559" }, { "category": "external", "summary": "SUSE Bug 1180562 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180562" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-36158" }, { "cve": "CVE-2020-4788", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-4788" } ], "notes": [ { "category": "general", "text": "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-4788", "url": "https://www.suse.com/security/cve/CVE-2020-4788" }, { "category": "external", "summary": "SUSE Bug 1177666 for CVE-2020-4788", "url": "https://bugzilla.suse.com/1177666" }, { "category": "external", "summary": "SUSE Bug 1181158 for CVE-2020-4788", "url": "https://bugzilla.suse.com/1181158" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-4788" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-8694" } ] }
opensuse-su-2020:1682-1
Vulnerability from csaf_opensuse
Published
2020-10-17 08:06
Modified
2020-10-17 08:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-12351: A type confusion while processing AMP packets could be used by physical close attackers to crash the kernel or potentially execute code was fixed (bsc#1177724).
- CVE-2020-12352: A stack information leak when handling certain AMP packets could be used by physical close attackers to leak information from the kernel was fixed (bsc#1177725).
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452 (bnc#1176381).
- CVE-2020-25645: Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1177511).
The following non-security bugs were fixed:
- 59c7c3caaaf8 ('nvme: fix possible hang when ns scanning fails during error recovery')
- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).
- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- ea43d9709f72 ('nvme: fix identify error status silent ignore')
- i2c: meson: fix clock setting overwrite (git-fixes).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm() (bsc#1177685).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- nvme-multipath: do not reset on unknown status (bsc#1174748).
- nvme-rdma: Avoid double freeing of async event data (bsc#1174748).
- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1174748).
- nvme: Namepace identification descriptor list is optional (bsc#1174748).
- nvme: add a Identify Namespace Identification Descriptor list quirk (bsc#1174748).
- nvme: fix deadlock caused by ANA update wrong locking (bsc#1174748).
- nvme: fix possible io failures when removing multipathed ns (bsc#1174748).
- nvme: make nvme_identify_ns propagate errors back (bsc#1174748).
- nvme: make nvme_report_ns_ids propagate error back (bsc#1174748).
- nvme: pass status to nvme_error_status (bsc#1174748).
- nvme: return error from nvme_alloc_ns() (bsc#1174748).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- scsi: hisi_sas: Add debugfs ITCT file and add file operations (bsc#1140683).
- scsi: hisi_sas: Add manual trigger for debugfs dump (bsc#1140683).
- scsi: hisi_sas: Add missing seq_printf() call in hisi_sas_show_row_32() (bsc#1140683).
- scsi: hisi_sas: Change return variable type in phy_up_v3_hw() (bsc#1140683).
- scsi: hisi_sas: Correct memory allocation size for DQ debugfs (bsc#1140683).
- scsi: hisi_sas: Do some more tidy-up (bsc#1140683).
- scsi: hisi_sas: Fix a timeout race of driver internal and SMP IO (bsc#1140683).
- scsi: hisi_sas: Fix type casting and missing static qualifier in debugfs code (bsc#1140683). Refresh:
- scsi: hisi_sas: No need to check return value of debugfs_create functions (bsc#1140683). Update:
- scsi: hisi_sas: Some misc tidy-up (bsc#1140683).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix memory size truncation (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Performance tweak (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1176946 bsc#1175520 bsc#1172538).
Patchnames
openSUSE-2020-1682
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-12351: A type confusion while processing AMP packets could be used by physical close attackers to crash the kernel or potentially execute code was fixed (bsc#1177724).\n- CVE-2020-12352: A stack information leak when handling certain AMP packets could be used by physical close attackers to leak information from the kernel was fixed (bsc#1177725).\n- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452 (bnc#1176381).\n- CVE-2020-25645: Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1177511).\n\nThe following non-security bugs were fixed:\n\n- 59c7c3caaaf8 (\u0027nvme: fix possible hang when ns scanning fails during error recovery\u0027)\n- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).\n- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).\n- drm/sun4i: mixer: Extend regmap max_register (git-fixes).\n- ea43d9709f72 (\u0027nvme: fix identify error status silent ignore\u0027)\n- i2c: meson: fix clock setting overwrite (git-fixes).\n- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).\n- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).\n- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).\n- mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm() (bsc#1177685).\n- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).\n- nvme-multipath: do not reset on unknown status (bsc#1174748).\n- nvme-rdma: Avoid double freeing of async event data (bsc#1174748).\n- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1174748).\n- nvme: Namepace identification descriptor list is optional (bsc#1174748).\n- nvme: add a Identify Namespace Identification Descriptor list quirk (bsc#1174748).\n- nvme: fix deadlock caused by ANA update wrong locking (bsc#1174748).\n- nvme: fix possible io failures when removing multipathed ns (bsc#1174748).\n- nvme: make nvme_identify_ns propagate errors back (bsc#1174748).\n- nvme: make nvme_report_ns_ids propagate error back (bsc#1174748).\n- nvme: pass status to nvme_error_status (bsc#1174748).\n- nvme: return error from nvme_alloc_ns() (bsc#1174748).\n- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).\n- scsi: hisi_sas: Add debugfs ITCT file and add file operations (bsc#1140683).\n- scsi: hisi_sas: Add manual trigger for debugfs dump (bsc#1140683).\n- scsi: hisi_sas: Add missing seq_printf() call in hisi_sas_show_row_32() (bsc#1140683).\n- scsi: hisi_sas: Change return variable type in phy_up_v3_hw() (bsc#1140683).\n- scsi: hisi_sas: Correct memory allocation size for DQ debugfs (bsc#1140683).\n- scsi: hisi_sas: Do some more tidy-up (bsc#1140683).\n- scsi: hisi_sas: Fix a timeout race of driver internal and SMP IO (bsc#1140683).\n- scsi: hisi_sas: Fix type casting and missing static qualifier in debugfs code (bsc#1140683). Refresh:\n- scsi: hisi_sas: No need to check return value of debugfs_create functions (bsc#1140683). Update:\n- scsi: hisi_sas: Some misc tidy-up (bsc#1140683).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Performance tweak (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Remove unneeded variable \u0027rval\u0027 (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1176946 bsc#1175520 bsc#1172538).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-1682", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1682-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:1682-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7AP5V2WMODZLL2BP3KNT37XWNT7K5NX/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:1682-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7AP5V2WMODZLL2BP3KNT37XWNT7K5NX/" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1140683", "url": "https://bugzilla.suse.com/1140683" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1175520", "url": "https://bugzilla.suse.com/1175520" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176946", "url": "https://bugzilla.suse.com/1176946" }, { "category": "self", "summary": "SUSE Bug 1177340", "url": "https://bugzilla.suse.com/1177340" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177685", "url": "https://bugzilla.suse.com/1177685" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-10-17T08:06:42Z", "generator": { "date": "2020-10-17T08:06:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:1682-1", "initial_release_date": "2020-10-17T08:06:42Z", "revision_history": [ { "date": "2020-10-17T08:06:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp151.28.75.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp151.28.75.1.noarch", "product_id": "kernel-devel-4.12.14-lp151.28.75.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp151.28.75.1.noarch", "product": { "name": "kernel-docs-4.12.14-lp151.28.75.1.noarch", "product_id": "kernel-docs-4.12.14-lp151.28.75.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp151.28.75.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp151.28.75.1.noarch", "product_id": "kernel-docs-html-4.12.14-lp151.28.75.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp151.28.75.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp151.28.75.1.noarch", "product_id": "kernel-macros-4.12.14-lp151.28.75.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp151.28.75.1.noarch", "product": { "name": "kernel-source-4.12.14-lp151.28.75.1.noarch", "product_id": "kernel-source-4.12.14-lp151.28.75.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp151.28.75.1.x86_64", "product": { "name": "kernel-debug-4.12.14-lp151.28.75.1.x86_64", "product_id": "kernel-debug-4.12.14-lp151.28.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp151.28.75.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp151.28.75.1.x86_64", "product_id": "kernel-debug-base-4.12.14-lp151.28.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp151.28.75.1.x86_64", "product": { "name": "kernel-default-4.12.14-lp151.28.75.1.x86_64", "product_id": "kernel-default-4.12.14-lp151.28.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp151.28.75.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp151.28.75.1.x86_64", "product_id": "kernel-default-base-4.12.14-lp151.28.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp151.28.75.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp151.28.75.1.x86_64", "product_id": "kernel-default-devel-4.12.14-lp151.28.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp151.28.75.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp151.28.75.1.x86_64", "product_id": "kernel-obs-build-4.12.14-lp151.28.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp151.28.75.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp151.28.75.1.x86_64", "product_id": "kernel-syms-4.12.14-lp151.28.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp151.28.75.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp151.28.75.1.x86_64", "product_id": "kernel-vanilla-4.12.14-lp151.28.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp151.28.75.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.75.1.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp151.28.75.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp151.28.75.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.75.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp151.28.75.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp151.28.75.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.75.1.x86_64" }, "product_reference": "kernel-default-4.12.14-lp151.28.75.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp151.28.75.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.75.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp151.28.75.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp151.28.75.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.75.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp151.28.75.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp151.28.75.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.75.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp151.28.75.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp151.28.75.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.75.1.noarch" }, "product_reference": "kernel-docs-4.12.14-lp151.28.75.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp151.28.75.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.75.1.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp151.28.75.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp151.28.75.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.75.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp151.28.75.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp151.28.75.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.75.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp151.28.75.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp151.28.75.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.75.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp151.28.75.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp151.28.75.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.75.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp151.28.75.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp151.28.75.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.75.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp151.28.75.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-17T08:06:42Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-17T08:06:42Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-17T08:06:42Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.75.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.75.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-17T08:06:42Z", "details": "important" } ], "title": "CVE-2020-25645" } ] }
opensuse-su-2024:10728-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-5.14.6-1.4 on GA media
Notes
Title of the patch
kernel-devel-5.14.6-1.4 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10728
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-devel-5.14.6-1.4 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10728", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10728-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000251 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000251/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12153 page", "url": "https://www.suse.com/security/cve/CVE-2017-12153/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13080 page", "url": "https://www.suse.com/security/cve/CVE-2017-13080/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14051 page", "url": "https://www.suse.com/security/cve/CVE-2017-14051/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15129 page", "url": "https://www.suse.com/security/cve/CVE-2017-15129/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15265 page", "url": "https://www.suse.com/security/cve/CVE-2017-15265/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16536 page", "url": "https://www.suse.com/security/cve/CVE-2017-16536/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16537 page", "url": "https://www.suse.com/security/cve/CVE-2017-16537/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16645 page", "url": "https://www.suse.com/security/cve/CVE-2017-16645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16646 page", "url": "https://www.suse.com/security/cve/CVE-2017-16646/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16647 page", "url": "https://www.suse.com/security/cve/CVE-2017-16647/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16648 page", "url": "https://www.suse.com/security/cve/CVE-2017-16648/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16995 page", "url": "https://www.suse.com/security/cve/CVE-2017-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16996 page", "url": "https://www.suse.com/security/cve/CVE-2017-16996/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17448 page", "url": "https://www.suse.com/security/cve/CVE-2017-17448/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17449 page", "url": "https://www.suse.com/security/cve/CVE-2017-17449/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17450 page", "url": "https://www.suse.com/security/cve/CVE-2017-17450/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17852 page", "url": "https://www.suse.com/security/cve/CVE-2017-17852/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17853 page", "url": "https://www.suse.com/security/cve/CVE-2017-17853/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17854 page", "url": "https://www.suse.com/security/cve/CVE-2017-17854/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17855 page", "url": "https://www.suse.com/security/cve/CVE-2017-17855/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17856 page", "url": "https://www.suse.com/security/cve/CVE-2017-17856/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17857 page", "url": "https://www.suse.com/security/cve/CVE-2017-17857/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17862 page", "url": "https://www.suse.com/security/cve/CVE-2017-17862/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5123 page", "url": "https://www.suse.com/security/cve/CVE-2017-5123/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5754 page", "url": "https://www.suse.com/security/cve/CVE-2017-5754/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7541 page", "url": "https://www.suse.com/security/cve/CVE-2017-7541/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7542 page", "url": "https://www.suse.com/security/cve/CVE-2017-7542/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8824 page", "url": "https://www.suse.com/security/cve/CVE-2017-8824/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8831 page", "url": "https://www.suse.com/security/cve/CVE-2017-8831/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10322 page", "url": "https://www.suse.com/security/cve/CVE-2018-10322/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10323 page", "url": "https://www.suse.com/security/cve/CVE-2018-10323/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1118 page", "url": "https://www.suse.com/security/cve/CVE-2018-1118/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12232 page", "url": "https://www.suse.com/security/cve/CVE-2018-12232/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12714 page", "url": "https://www.suse.com/security/cve/CVE-2018-12714/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18710 page", "url": "https://www.suse.com/security/cve/CVE-2018-18710/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19824 page", "url": "https://www.suse.com/security/cve/CVE-2018-19824/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5332 page", "url": "https://www.suse.com/security/cve/CVE-2018-5332/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5333 page", "url": "https://www.suse.com/security/cve/CVE-2018-5333/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8043 page", "url": "https://www.suse.com/security/cve/CVE-2018-8043/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8087 page", "url": "https://www.suse.com/security/cve/CVE-2018-8087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10207 page", "url": "https://www.suse.com/security/cve/CVE-2019-10207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11479 page", "url": "https://www.suse.com/security/cve/CVE-2019-11479/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14615 page", "url": "https://www.suse.com/security/cve/CVE-2019-14615/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14814 page", "url": "https://www.suse.com/security/cve/CVE-2019-14814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15030 page", "url": "https://www.suse.com/security/cve/CVE-2019-15030/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15031 page", "url": "https://www.suse.com/security/cve/CVE-2019-15031/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15098 page", "url": "https://www.suse.com/security/cve/CVE-2019-15098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15099 page", "url": "https://www.suse.com/security/cve/CVE-2019-15099/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15290 page", "url": "https://www.suse.com/security/cve/CVE-2019-15290/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15504 page", "url": "https://www.suse.com/security/cve/CVE-2019-15504/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15902 page", "url": "https://www.suse.com/security/cve/CVE-2019-15902/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16231 page", "url": "https://www.suse.com/security/cve/CVE-2019-16231/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18808 page", "url": "https://www.suse.com/security/cve/CVE-2019-18808/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18812 page", "url": "https://www.suse.com/security/cve/CVE-2019-18812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18813 page", "url": "https://www.suse.com/security/cve/CVE-2019-18813/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19252 page", "url": "https://www.suse.com/security/cve/CVE-2019-19252/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19332 page", "url": "https://www.suse.com/security/cve/CVE-2019-19332/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19338 page", "url": "https://www.suse.com/security/cve/CVE-2019-19338/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3016 page", "url": "https://www.suse.com/security/cve/CVE-2019-3016/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3882 page", "url": "https://www.suse.com/security/cve/CVE-2019-3882/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3887 page", "url": "https://www.suse.com/security/cve/CVE-2019-3887/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8564 page", "url": "https://www.suse.com/security/cve/CVE-2019-8564/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9500 page", "url": "https://www.suse.com/security/cve/CVE-2019-9500/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24588 page", "url": "https://www.suse.com/security/cve/CVE-2020-24588/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2732 page", "url": "https://www.suse.com/security/cve/CVE-2020-2732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8648 page", "url": "https://www.suse.com/security/cve/CVE-2020-8648/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26708 page", "url": "https://www.suse.com/security/cve/CVE-2021-26708/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28971 page", "url": "https://www.suse.com/security/cve/CVE-2021-28971/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32606 page", "url": "https://www.suse.com/security/cve/CVE-2021-32606/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33909 page", "url": "https://www.suse.com/security/cve/CVE-2021-33909/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3483 page", "url": "https://www.suse.com/security/cve/CVE-2021-3483/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3489 page", "url": "https://www.suse.com/security/cve/CVE-2021-3489/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3490 page", "url": "https://www.suse.com/security/cve/CVE-2021-3490/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3640 page", "url": "https://www.suse.com/security/cve/CVE-2021-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3653 page", "url": "https://www.suse.com/security/cve/CVE-2021-3653/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3656 page", "url": "https://www.suse.com/security/cve/CVE-2021-3656/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3744 page", "url": "https://www.suse.com/security/cve/CVE-2021-3744/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3753 page", "url": "https://www.suse.com/security/cve/CVE-2021-3753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37576 page", "url": "https://www.suse.com/security/cve/CVE-2021-37576/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3759 page", "url": "https://www.suse.com/security/cve/CVE-2021-3759/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38166 page", "url": "https://www.suse.com/security/cve/CVE-2021-38166/" } ], "title": "kernel-devel-5.14.6-1.4 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10728-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.aarch64", "product": { "name": "kernel-devel-5.14.6-1.4.aarch64", "product_id": "kernel-devel-5.14.6-1.4.aarch64" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.aarch64", "product": { "name": "kernel-macros-5.14.6-1.4.aarch64", "product_id": "kernel-macros-5.14.6-1.4.aarch64" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.aarch64", "product": { "name": "kernel-source-5.14.6-1.4.aarch64", "product_id": "kernel-source-5.14.6-1.4.aarch64" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.aarch64", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.aarch64", "product_id": "kernel-source-vanilla-5.14.6-1.4.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.ppc64le", "product": { "name": "kernel-devel-5.14.6-1.4.ppc64le", "product_id": "kernel-devel-5.14.6-1.4.ppc64le" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.ppc64le", "product": { "name": "kernel-macros-5.14.6-1.4.ppc64le", "product_id": "kernel-macros-5.14.6-1.4.ppc64le" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.ppc64le", "product": { "name": "kernel-source-5.14.6-1.4.ppc64le", "product_id": "kernel-source-5.14.6-1.4.ppc64le" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le", "product_id": "kernel-source-vanilla-5.14.6-1.4.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.s390x", "product": { "name": "kernel-devel-5.14.6-1.4.s390x", "product_id": "kernel-devel-5.14.6-1.4.s390x" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.s390x", "product": { "name": "kernel-macros-5.14.6-1.4.s390x", "product_id": "kernel-macros-5.14.6-1.4.s390x" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.s390x", "product": { "name": "kernel-source-5.14.6-1.4.s390x", "product_id": "kernel-source-5.14.6-1.4.s390x" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.s390x", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.s390x", "product_id": "kernel-source-vanilla-5.14.6-1.4.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.x86_64", "product": { "name": "kernel-devel-5.14.6-1.4.x86_64", "product_id": "kernel-devel-5.14.6-1.4.x86_64" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.x86_64", "product": { "name": "kernel-macros-5.14.6-1.4.x86_64", "product_id": "kernel-macros-5.14.6-1.4.x86_64" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.x86_64", "product": { "name": "kernel-source-5.14.6-1.4.x86_64", "product_id": "kernel-source-5.14.6-1.4.x86_64" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.x86_64", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.x86_64", "product_id": "kernel-source-vanilla-5.14.6-1.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64" }, "product_reference": "kernel-devel-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-devel-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x" }, "product_reference": "kernel-devel-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64" }, "product_reference": "kernel-devel-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64" }, "product_reference": "kernel-macros-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-macros-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x" }, "product_reference": "kernel-macros-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64" }, "product_reference": "kernel-macros-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64" }, "product_reference": "kernel-source-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-source-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x" }, "product_reference": "kernel-source-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64" }, "product_reference": "kernel-source-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-1000251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000251" } ], "notes": [ { "category": "general", "text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000251", "url": "https://www.suse.com/security/cve/CVE-2017-1000251" }, { "category": "external", "summary": "SUSE Bug 1057389 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057389" }, { "category": "external", "summary": "SUSE Bug 1057950 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057950" }, { "category": "external", "summary": "SUSE Bug 1070535 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1070535" }, { "category": "external", "summary": "SUSE Bug 1072117 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072117" }, { "category": "external", "summary": "SUSE Bug 1072162 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072162" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-1000251" }, { "cve": "CVE-2017-12153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12153" } ], "notes": [ { "category": "general", "text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12153", "url": "https://www.suse.com/security/cve/CVE-2017-12153" }, { "category": "external", "summary": "SUSE Bug 1058410 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058410" }, { "category": "external", "summary": "SUSE Bug 1058624 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-12153" }, { "cve": "CVE-2017-13080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13080" } ], "notes": [ { "category": "general", "text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13080", "url": "https://www.suse.com/security/cve/CVE-2017-13080" }, { "category": "external", "summary": "SUSE Bug 1056061 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1056061" }, { "category": "external", "summary": "SUSE Bug 1063479 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063479" }, { "category": "external", "summary": "SUSE Bug 1063667 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063667" }, { "category": "external", "summary": "SUSE Bug 1063671 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063671" }, { "category": "external", "summary": "SUSE Bug 1066295 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1066295" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1178872 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1178872" }, { "category": "external", "summary": "SUSE Bug 1179588 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1179588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-13080" }, { "cve": "CVE-2017-14051", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14051" } ], "notes": [ { "category": "general", "text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14051", "url": "https://www.suse.com/security/cve/CVE-2017-14051" }, { "category": "external", "summary": "SUSE Bug 1056588 for CVE-2017-14051", "url": "https://bugzilla.suse.com/1056588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-14051" }, { "cve": "CVE-2017-15129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15129" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15129", "url": "https://www.suse.com/security/cve/CVE-2017-15129" }, { "category": "external", "summary": "SUSE Bug 1074839 for CVE-2017-15129", "url": "https://bugzilla.suse.com/1074839" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15129" }, { "cve": "CVE-2017-15265", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15265" } ], "notes": [ { "category": "general", "text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15265", "url": "https://www.suse.com/security/cve/CVE-2017-15265" }, { "category": "external", "summary": "SUSE Bug 1062520 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1062520" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-15265" }, { "cve": "CVE-2017-16536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16536" } ], "notes": [ { "category": "general", "text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16536", "url": "https://www.suse.com/security/cve/CVE-2017-16536" }, { "category": "external", "summary": "SUSE Bug 1066606 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1066606" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16536" }, { "cve": "CVE-2017-16537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16537" } ], "notes": [ { "category": "general", "text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16537", "url": "https://www.suse.com/security/cve/CVE-2017-16537" }, { "category": "external", "summary": "SUSE Bug 1066573 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1066573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16537" }, { "cve": "CVE-2017-16645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16645" } ], "notes": [ { "category": "general", "text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16645", "url": "https://www.suse.com/security/cve/CVE-2017-16645" }, { "category": "external", "summary": "SUSE Bug 1067132 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1067132" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16645" }, { "cve": "CVE-2017-16646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16646" } ], "notes": [ { "category": "general", "text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16646", "url": "https://www.suse.com/security/cve/CVE-2017-16646" }, { "category": "external", "summary": "SUSE Bug 1067105 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1067105" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16646" }, { "cve": "CVE-2017-16647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16647" } ], "notes": [ { "category": "general", "text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16647", "url": "https://www.suse.com/security/cve/CVE-2017-16647" }, { "category": "external", "summary": "SUSE Bug 1067102 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1067102" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16647" }, { "cve": "CVE-2017-16648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16648" } ], "notes": [ { "category": "general", "text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16648", "url": "https://www.suse.com/security/cve/CVE-2017-16648" }, { "category": "external", "summary": "SUSE Bug 1067087 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1067087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16648" }, { "cve": "CVE-2017-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16995" } ], "notes": [ { "category": "general", "text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16995", "url": "https://www.suse.com/security/cve/CVE-2017-16995" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16995", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16995" }, { "cve": "CVE-2017-16996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16996" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16996", "url": "https://www.suse.com/security/cve/CVE-2017-16996" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16996", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16996" }, { "cve": "CVE-2017-17448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17448" } ], "notes": [ { "category": "general", "text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17448", "url": "https://www.suse.com/security/cve/CVE-2017-17448" }, { "category": "external", "summary": "SUSE Bug 1071693 for CVE-2017-17448", "url": "https://bugzilla.suse.com/1071693" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17448" }, { "cve": "CVE-2017-17449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17449" } ], "notes": [ { "category": "general", "text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17449", "url": "https://www.suse.com/security/cve/CVE-2017-17449" }, { "category": "external", "summary": "SUSE Bug 1071694 for CVE-2017-17449", "url": "https://bugzilla.suse.com/1071694" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17449" }, { "cve": "CVE-2017-17450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17450" } ], "notes": [ { "category": "general", "text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17450", "url": "https://www.suse.com/security/cve/CVE-2017-17450" }, { "category": "external", "summary": "SUSE Bug 1071695 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1071695" }, { "category": "external", "summary": "SUSE Bug 1074033 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1074033" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17450" }, { "cve": "CVE-2017-17852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17852" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17852", "url": "https://www.suse.com/security/cve/CVE-2017-17852" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17852", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17852" }, { "cve": "CVE-2017-17853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17853" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17853", "url": "https://www.suse.com/security/cve/CVE-2017-17853" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17853", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17853" }, { "cve": "CVE-2017-17854", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17854" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17854", "url": "https://www.suse.com/security/cve/CVE-2017-17854" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17854", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17854" }, { "cve": "CVE-2017-17855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17855" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17855", "url": "https://www.suse.com/security/cve/CVE-2017-17855" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17855", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17855" }, { "cve": "CVE-2017-17856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17856" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17856", "url": "https://www.suse.com/security/cve/CVE-2017-17856" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17856", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17856" }, { "cve": "CVE-2017-17857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17857" } ], "notes": [ { "category": "general", "text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17857", "url": "https://www.suse.com/security/cve/CVE-2017-17857" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17857", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17857" }, { "cve": "CVE-2017-17862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17862" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17862", "url": "https://www.suse.com/security/cve/CVE-2017-17862" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17862", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17862" }, { "cve": "CVE-2017-5123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5123" } ], "notes": [ { "category": "general", "text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5123", "url": "https://www.suse.com/security/cve/CVE-2017-5123" }, { "category": "external", "summary": "SUSE Bug 1062473 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1062473" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5123" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2017-5754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5754" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5754", "url": "https://www.suse.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075008 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075008" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1115045" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-5754" }, { "cve": "CVE-2017-7541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7541" } ], "notes": [ { "category": "general", "text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7541", "url": "https://www.suse.com/security/cve/CVE-2017-7541" }, { "category": "external", "summary": "SUSE Bug 1049645 for CVE-2017-7541", "url": "https://bugzilla.suse.com/1049645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7541" }, { "cve": "CVE-2017-7542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7542" } ], "notes": [ { "category": "general", "text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7542", "url": "https://www.suse.com/security/cve/CVE-2017-7542" }, { "category": "external", "summary": "SUSE Bug 1049882 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1049882" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1061936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7542" }, { "cve": "CVE-2017-8824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8824" } ], "notes": [ { "category": "general", "text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8824", "url": "https://www.suse.com/security/cve/CVE-2017-8824" }, { "category": "external", "summary": "SUSE Bug 1070771 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1070771" }, { "category": "external", "summary": "SUSE Bug 1076734 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1076734" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1092904" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-8824" }, { "cve": "CVE-2017-8831", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8831" } ], "notes": [ { "category": "general", "text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8831", "url": "https://www.suse.com/security/cve/CVE-2017-8831" }, { "category": "external", "summary": "SUSE Bug 1037994 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1037994" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1061936" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-8831" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-10322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10322" } ], "notes": [ { "category": "general", "text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10322", "url": "https://www.suse.com/security/cve/CVE-2018-10322" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090749 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1090749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10322" }, { "cve": "CVE-2018-10323", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10323" } ], "notes": [ { "category": "general", "text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10323", "url": "https://www.suse.com/security/cve/CVE-2018-10323" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090717 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1090717" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10323" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1118" } ], "notes": [ { "category": "general", "text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1118", "url": "https://www.suse.com/security/cve/CVE-2018-1118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092472 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1092472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1118" }, { "cve": "CVE-2018-12232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12232" } ], "notes": [ { "category": "general", "text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12232", "url": "https://www.suse.com/security/cve/CVE-2018-12232" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097593 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1097593" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1127757 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1127757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12232" }, { "cve": "CVE-2018-12714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12714" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12714", "url": "https://www.suse.com/security/cve/CVE-2018-12714" }, { "category": "external", "summary": "SUSE Bug 1098933 for CVE-2018-12714", "url": "https://bugzilla.suse.com/1098933" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12714" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-18710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18710" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18710", "url": "https://www.suse.com/security/cve/CVE-2018-18710" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-18710", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-18710" }, { "cve": "CVE-2018-19824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19824" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19824", "url": "https://www.suse.com/security/cve/CVE-2018-19824" }, { "category": "external", "summary": "SUSE Bug 1118152 for CVE-2018-19824", "url": "https://bugzilla.suse.com/1118152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19824" }, { "cve": "CVE-2018-5332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5332" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5332", "url": "https://www.suse.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "SUSE Bug 1075621 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1075621" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5333" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5333", "url": "https://www.suse.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "SUSE Bug 1075617 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1075617" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5333" }, { "cve": "CVE-2018-8043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8043" } ], "notes": [ { "category": "general", "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8043", "url": "https://www.suse.com/security/cve/CVE-2018-8043" }, { "category": "external", "summary": "SUSE Bug 1084829 for CVE-2018-8043", "url": "https://bugzilla.suse.com/1084829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-8043" }, { "cve": "CVE-2018-8087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8087" } ], "notes": [ { "category": "general", "text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8087", "url": "https://www.suse.com/security/cve/CVE-2018-8087" }, { "category": "external", "summary": "SUSE Bug 1085053 for CVE-2018-8087", "url": "https://bugzilla.suse.com/1085053" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8087" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2019-10207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10207" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10207", "url": "https://www.suse.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "SUSE Bug 1123959 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1123959" }, { "category": "external", "summary": "SUSE Bug 1142857 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1142857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-10207" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11479", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11479" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11479", "url": "https://www.suse.com/security/cve/CVE-2019-11479" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11479" }, { "cve": "CVE-2019-14615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14615" } ], "notes": [ { "category": "general", "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14615", "url": "https://www.suse.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "SUSE Bug 1160195 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1160195" }, { "category": "external", "summary": "SUSE Bug 1165881 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1165881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14615" }, { "cve": "CVE-2019-14814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14814" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14814", "url": "https://www.suse.com/security/cve/CVE-2019-14814" }, { "category": "external", "summary": "SUSE Bug 1146512 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1146512" }, { "category": "external", "summary": "SUSE Bug 1173664 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173664" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14814" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-15030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15030" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15030", "url": "https://www.suse.com/security/cve/CVE-2019-15030" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15030", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15030" }, { "cve": "CVE-2019-15031", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15031" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15031", "url": "https://www.suse.com/security/cve/CVE-2019-15031" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15031", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15031" }, { "cve": "CVE-2019-15098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15098" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15098", "url": "https://www.suse.com/security/cve/CVE-2019-15098" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146543" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15098" }, { "cve": "CVE-2019-15099", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15099" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15099", "url": "https://www.suse.com/security/cve/CVE-2019-15099" }, { "category": "external", "summary": "SUSE Bug 1146368 for CVE-2019-15099", "url": "https://bugzilla.suse.com/1146368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15099" }, { "cve": "CVE-2019-15290", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15290" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15290", "url": "https://www.suse.com/security/cve/CVE-2019-15290" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146543" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15290" }, { "cve": "CVE-2019-15504", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15504" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15504", "url": "https://www.suse.com/security/cve/CVE-2019-15504" }, { "category": "external", "summary": "SUSE Bug 1147116 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1147116" }, { "category": "external", "summary": "SUSE Bug 1185852 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1185852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-15504" }, { "cve": "CVE-2019-15902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15902" } ], "notes": [ { "category": "general", "text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15902", "url": "https://www.suse.com/security/cve/CVE-2019-15902" }, { "category": "external", "summary": "SUSE Bug 1149376 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1149376" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15902" }, { "cve": "CVE-2019-16231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16231" } ], "notes": [ { "category": "general", "text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16231", "url": "https://www.suse.com/security/cve/CVE-2019-16231" }, { "category": "external", "summary": "SUSE Bug 1150466 for CVE-2019-16231", "url": "https://bugzilla.suse.com/1150466" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-16231" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17666" }, { "cve": "CVE-2019-18808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18808" } ], "notes": [ { "category": "general", "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18808", "url": "https://www.suse.com/security/cve/CVE-2019-18808" }, { "category": "external", "summary": "SUSE Bug 1156259 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1156259" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18808" }, { "cve": "CVE-2019-18812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18812" } ], "notes": [ { "category": "general", "text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18812", "url": "https://www.suse.com/security/cve/CVE-2019-18812" }, { "category": "external", "summary": "SUSE Bug 1156277 for CVE-2019-18812", "url": "https://bugzilla.suse.com/1156277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18812" }, { "cve": "CVE-2019-18813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18813" } ], "notes": [ { "category": "general", "text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18813", "url": "https://www.suse.com/security/cve/CVE-2019-18813" }, { "category": "external", "summary": "SUSE Bug 1156278 for CVE-2019-18813", "url": "https://bugzilla.suse.com/1156278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18813" }, { "cve": "CVE-2019-19252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19252" } ], "notes": [ { "category": "general", "text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19252", "url": "https://www.suse.com/security/cve/CVE-2019-19252" }, { "category": "external", "summary": "SUSE Bug 1157813 for CVE-2019-19252", "url": "https://bugzilla.suse.com/1157813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19252" }, { "cve": "CVE-2019-19332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19332" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19332", "url": "https://www.suse.com/security/cve/CVE-2019-19332" }, { "category": "external", "summary": "SUSE Bug 1158827 for CVE-2019-19332", "url": "https://bugzilla.suse.com/1158827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19332" }, { "cve": "CVE-2019-19338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19338" } ], "notes": [ { "category": "general", "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19338", "url": "https://www.suse.com/security/cve/CVE-2019-19338" }, { "category": "external", "summary": "SUSE Bug 1158954 for CVE-2019-19338", "url": "https://bugzilla.suse.com/1158954" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19338" }, { "cve": "CVE-2019-3016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3016" } ], "notes": [ { "category": "general", "text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3016", "url": "https://www.suse.com/security/cve/CVE-2019-3016" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1161154 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1161154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3016" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3846" }, { "cve": "CVE-2019-3882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3882", "url": "https://www.suse.com/security/cve/CVE-2019-3882" }, { "category": "external", "summary": "SUSE Bug 1131416 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131416" }, { "category": "external", "summary": "SUSE Bug 1131427 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131427" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3882" }, { "cve": "CVE-2019-3887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3887" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3887", "url": "https://www.suse.com/security/cve/CVE-2019-3887" }, { "category": "external", "summary": "SUSE Bug 1131800 for CVE-2019-3887", "url": "https://bugzilla.suse.com/1131800" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3887" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-8564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8564" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8564", "url": "https://www.suse.com/security/cve/CVE-2019-8564" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8564" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-9500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9500" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9500", "url": "https://www.suse.com/security/cve/CVE-2019-9500" }, { "category": "external", "summary": "SUSE Bug 1132681 for CVE-2019-9500", "url": "https://bugzilla.suse.com/1132681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-9500" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-24588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24588" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24588", "url": "https://www.suse.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "SUSE Bug 1185861 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1185861" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1192868" }, { "category": "external", "summary": "SUSE Bug 1199701 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1199701" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24588" }, { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-2732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2732" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2732", "url": "https://www.suse.com/security/cve/CVE-2020-2732" }, { "category": "external", "summary": "SUSE Bug 1163971 for CVE-2020-2732", "url": "https://bugzilla.suse.com/1163971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2732" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-8648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8648" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8648", "url": "https://www.suse.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "SUSE Bug 1162928 for CVE-2020-8648", "url": "https://bugzilla.suse.com/1162928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8694" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-26708", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26708" } ], "notes": [ { "category": "general", "text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26708", "url": "https://www.suse.com/security/cve/CVE-2021-26708" }, { "category": "external", "summary": "SUSE Bug 1181806 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1181806" }, { "category": "external", "summary": "SUSE Bug 1183298 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1183298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-26708" }, { "cve": "CVE-2021-28971", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28971" } ], "notes": [ { "category": "general", "text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28971", "url": "https://www.suse.com/security/cve/CVE-2021-28971" }, { "category": "external", "summary": "SUSE Bug 1184196 for CVE-2021-28971", "url": "https://bugzilla.suse.com/1184196" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-28971" }, { "cve": "CVE-2021-32606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32606" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32606", "url": "https://www.suse.com/security/cve/CVE-2021-32606" }, { "category": "external", "summary": "SUSE Bug 1185953 for CVE-2021-32606", "url": "https://bugzilla.suse.com/1185953" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-32606" }, { "cve": "CVE-2021-33909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33909" } ], "notes": [ { "category": "general", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33909", "url": "https://www.suse.com/security/cve/CVE-2021-33909" }, { "category": "external", "summary": "SUSE Bug 1188062 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188062" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188063" }, { "category": "external", "summary": "SUSE Bug 1188257 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188257" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1189302" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-33909" }, { "cve": "CVE-2021-3483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3483" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3483", "url": "https://www.suse.com/security/cve/CVE-2021-3483" }, { "category": "external", "summary": "SUSE Bug 1184393 for CVE-2021-3483", "url": "https://bugzilla.suse.com/1184393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3483" }, { "cve": "CVE-2021-3489", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3489" } ], "notes": [ { "category": "general", "text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3489", "url": "https://www.suse.com/security/cve/CVE-2021-3489" }, { "category": "external", "summary": "SUSE Bug 1185640 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185640" }, { "category": "external", "summary": "SUSE Bug 1185856 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3489" }, { "cve": "CVE-2021-3490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3490" } ], "notes": [ { "category": "general", "text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3490", "url": "https://www.suse.com/security/cve/CVE-2021-3490" }, { "category": "external", "summary": "SUSE Bug 1185641 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185641" }, { "category": "external", "summary": "SUSE Bug 1185796 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185796" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3490" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3491" }, { "cve": "CVE-2021-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3640" } ], "notes": [ { "category": "general", "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3640", "url": "https://www.suse.com/security/cve/CVE-2021-3640" }, { "category": "external", "summary": "SUSE Bug 1188172 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188172" }, { "category": "external", "summary": "SUSE Bug 1188613 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188613" }, { "category": "external", "summary": "SUSE Bug 1191530 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1191530" }, { "category": "external", "summary": "SUSE Bug 1196810 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196810" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3640" }, { "cve": "CVE-2021-3653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3653" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3653", "url": "https://www.suse.com/security/cve/CVE-2021-3653" }, { "category": "external", "summary": "SUSE Bug 1189399 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189399" }, { "category": "external", "summary": "SUSE Bug 1189420 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189420" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3653" }, { "cve": "CVE-2021-3656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3656", "url": "https://www.suse.com/security/cve/CVE-2021-3656" }, { "category": "external", "summary": "SUSE Bug 1189400 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189400" }, { "category": "external", "summary": "SUSE Bug 1189418 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3656" }, { "cve": "CVE-2021-3744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3744" } ], "notes": [ { "category": "general", "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3744", "url": "https://www.suse.com/security/cve/CVE-2021-3744" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3744" }, { "cve": "CVE-2021-3753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3753" } ], "notes": [ { "category": "general", "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3753", "url": "https://www.suse.com/security/cve/CVE-2021-3753" }, { "category": "external", "summary": "SUSE Bug 1190025 for CVE-2021-3753", "url": "https://bugzilla.suse.com/1190025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3753" }, { "cve": "CVE-2021-37576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-37576" } ], "notes": [ { "category": "general", "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-37576", "url": "https://www.suse.com/security/cve/CVE-2021-37576" }, { "category": "external", "summary": "SUSE Bug 1188838 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188838" }, { "category": "external", "summary": "SUSE Bug 1188842 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188842" }, { "category": "external", "summary": "SUSE Bug 1190276 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1190276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-37576" }, { "cve": "CVE-2021-3759", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3759" } ], "notes": [ { "category": "general", "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3759", "url": "https://www.suse.com/security/cve/CVE-2021-3759" }, { "category": "external", "summary": "SUSE Bug 1190115 for CVE-2021-3759", "url": "https://bugzilla.suse.com/1190115" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3759" }, { "cve": "CVE-2021-38166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-38166" } ], "notes": [ { "category": "general", "text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-38166", "url": "https://www.suse.com/security/cve/CVE-2021-38166" }, { "category": "external", "summary": "SUSE Bug 1189233 for CVE-2021-38166", "url": "https://bugzilla.suse.com/1189233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-38166" } ] }
gsd-2020-12351
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-12351", "description": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "id": "GSD-2020-12351", "references": [ "https://www.suse.com/security/cve/CVE-2020-12351.html", "https://www.debian.org/security/2020/dsa-4774", "https://access.redhat.com/errata/RHSA-2020:4289", "https://access.redhat.com/errata/RHSA-2020:4288", "https://access.redhat.com/errata/RHSA-2020:4287", "https://access.redhat.com/errata/RHSA-2020:4286", "https://access.redhat.com/errata/RHSA-2020:4281", "https://access.redhat.com/errata/RHSA-2020:4280", "https://access.redhat.com/errata/RHSA-2020:4279", "https://access.redhat.com/errata/RHSA-2020:4278", "https://access.redhat.com/errata/RHSA-2020:4277", "https://access.redhat.com/errata/RHSA-2020:4276", "https://ubuntu.com/security/CVE-2020-12351", "https://advisories.mageia.org/CVE-2020-12351.html", "https://security.archlinux.org/CVE-2020-12351", "https://alas.aws.amazon.com/cve/html/CVE-2020-12351.html", "https://linux.oracle.com/cve/CVE-2020-12351.html", "https://packetstormsecurity.com/files/cve/CVE-2020-12351" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-12351" ], "details": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "id": "GSD-2020-12351", "modified": "2023-12-13T01:21:48.932579Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-12351", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BlueZ", "version": { "version_data": [ { "version_value": "See references" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "escalation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351" }, { "name": "http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.9.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.8.16", "versionStartIncluding": "5.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.4.72", "versionStartIncluding": "4.20", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.19.152", "versionStartIncluding": "4.15", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.14.202", "versionStartIncluding": "4.10", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.9.240", "versionStartIncluding": "4.7.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-12351" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351" }, { "name": "http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-09-28T22:08Z", "publishedDate": "2020-11-23T17:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…